Legal Ethics & the Risk of Mishandling Electronic Evidence (counter forensics excerpt)

Scott Aurnou, Esq., CISSP discusses counter forensics in this excerpt from the Lawline program Legal Ethics & the Risk of Mishandling Electronic Evidence. The full program is available here:

https://www.lawline.com/course/legal-ethics-the-risk-of-mishandling-electronic-evidence-2.

Tagged with: , , , , , ,
Posted in Network Security

Cyber Security for Attorneys (two-factor authentication excerpt)

Scott Aurnou, Esq., CISSP discusses two-factor authentication in this excerpt from the Lawline program Cyber Security for Attorneys: First Steps to Protecting Yourself Now. The full program is available here:

https://www.lawline.com/course/cyber-security-for-attorneys-first-steps-to-protecting-yourself-now-part-1 (Part I), and

https://www.lawline.com/course/cyber-security-for-attorneys-first-steps-to-protecting-yourself-now-part-2 (Part II).

Tagged with: , , , , ,
Posted in Laptops & Desktops, Security Awareness, Smartphones & Tablets

Security Awareness Basics: Proper Data Disposal

Are your employees part of the problem, or part of the solution?

Security awareness is important for organizations of all sizes (and sometimes required by law and/or industry standards). Different organizations face different types of threats, and proper security awareness training should be tailored to the risks your organization is likely to encounter. This series offers a basic overview of security concepts. For awareness training tailored to your employees and the risks your organization is likely to face, contact The Security Advocate.

Website mentioned in this clip:
BleachBit

Tagged with: , , , , , , , ,
Posted in Laptops & Desktops, Network Security, Security Awareness, Smartphones & Tablets

Data Protection, Security & Legal Ethics (malware excerpt)

Scott Aurnou, Esq., CISSP discusses a few categories of malware in this excerpt from the Lawline program Data Protection, Security & Legal Ethics. The full program is available here: https://www.lawline.com/course/data-protection-security-legal-ethics-2.

Tagged with: , , , , , ,
Posted in Laptops & Desktops, Security Awareness, Smartphones & Tablets

A Better Approach to Security Awareness

Here’s a novel (and sorely needed) approach to security awareness training – videos that users will actually want to watch. From the Hashtag Awareness website:

Cyber security training videos are bad. We know, we’ve sat through them.

The Hashtag Awareness video series tackles the boring topics of cyber security with a fresh approach. How? We challenged ourselves to make videos that we would want to sit through.

Jason Hoenich has spent years building security awareness programs for companies like Disney, Sony Pictures, and Activision Blizzard. His experience writing and producing unique content for Disney resulted in the idea for the series. He and his partner Benita Robledo have created short, funny and informative videos (with impressive production values) on topics ranging from social engineering to remote work & WiFi hotspot security. I spoke with Jason recently and really like his approach. He was kind enough to share Hashtag Awareness’ social media privacy video (at the top of this post). Enjoy!
Read more ›

Tagged with: , , , , , ,
Posted in Fraud & Scams, Guest Posts, Privacy Issues, Security Awareness