Category Archives: Fall 2012 Edition

Security and Privacy: This is not a case of “opposites attract”

David SherryWhat have you done with technology in the last 24-48 hours? I going to assume that you did many, many things including: used your email, looked up sports scores or news, sent a text (or hundreds), purchased a book on Amazon, sent or viewed tweets, updated your wall, and reviewed your calendar to plan a trip to view the foliage. And I can also assume that you did some work with your devices and networked technology as well.

Continue reading Security and Privacy: This is not a case of “opposites attract”

IT Profile: Patrick Laverty on Web Security

Patrick LavertyPatrick Laverty is a longtime member of CIS’s WebServices Team and the “Go-To Guy” for web application security. He is founder of the Rhode Island chapter of OWASP (Open Web Application Security Project), coordinating monthly meetings, which feature guest speakers (such as PaulDotCom’s and former CIS employee Paul Asadoorian) and provide an opportunity for like-minded folk to network.

Continue reading IT Profile: Patrick Laverty on Web Security

Devising a Safer Environment for your Mobile Device

smartphoneSmartphones and tablets now let us put the power of a computer in a pocket, purse or small bag, meaning it is often at hand and on duty 24×7.  Add to the mix that these mobile devices tend to carry more personal information than your desk/laptop did, many are unprotected, and the instances of mobile malware have risen 185% in less than a year [ 1 ].  The result? You’re at an ever increasing risk when using your mobile device. So, how best to defend yourself?

Continue reading Devising a Safer Environment for your Mobile Device

Identity Finder & Symantec Endpoint Encryption Reminder

If you are new to Brown or missed ISG’s announcements earlier this year, CIS offers two security-related products you should investigate and see if either is right for you.

Identity Finder (IDF) software lets you scan your computer to see what personally identifiable information (PII) may be stored on it and take appropriate measures to either secure or remove it.

Continue reading Identity Finder & Symantec Endpoint Encryption Reminder

When it comes to passwords, R U A 10+?

Are you a 10+?We know that as a member of the Brown community you are generally very security-conscious, especially when it comes to protecting Brown and/or your own personal information. You are aware of how important passwords are to safeguarding that information. So you do your best to protect passwords, don’t share them, and change one if there is reason to believe it has been compromised.

Continue reading When it comes to passwords, R U A 10+?

HACKED: Now What?

Computer key with sad emoticon :( on it“The sooner you identify you have been compromised and the faster you respond, the more you can minimize the harm.”

Chad Tilbury is the guest editor for this issue (OUCH! security awareness newsletter).  He has extensive experience investigating computer crimes and is a co-author of the FOR408 Windows Forensics and FOR508 Advanced Forensics and Incident Response classes at the SANS Institute.  You can find him on Twitter as @chadtilbury, or on his blog, forensicmethods.com.

Continue reading HACKED: Now What?