Despite Headlines, Local Efforts Make 2015 a Safer Year

Looking back at 2015, many newsgroups showed events like the Umpqua Community College shooting in Oregon, terrorist attacks in San Bernandino or the church shooting in Charleston, South Carolina as proof of a year of violent escalation. One viral story reported there was more than one “mass shooting” for every day of the year. Despite […]

Read More…

California passes strict social media privacy law

Business and colleges barred from requesting access to employees, students personal social media accounts under new law Sept. 28–SACRAMENTO — California, home to many of the world’s social media companies, now has the nation’s strictest privacy laws preventing your boss or college from surfing through the personal information you post on sites like Facebook. It […]

Read More…

Emotional, physical cost of workplace bullying

SYSTEMATIC DESTRUCTION: It jeopardizes health, career and the job once loved by the victim BRODIE Panlock was a waitress working at a café in Australia. Her mother described her as a “beautiful girl who was full of compassion”. Brodie never told her mother that she was viciously bullied by her co-workers. She was just 19 […]

Read More…

5 Mobile Security Lessons From the Department of Defense

Several years ago, the National Security Agency wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too. Try this thought experiment. You want to provide smartphones, iPads and other mobile […]

Read More…

Claim of iPhone hacking raises questions about FBI data

A hacker group says it obtained millions of identification numbers from iPhones, iPads and other devices from an FBI laptop. The agency denies having the data. WASHINGTON — A hacker group’s claim that it obtained from an FBI laptop a file with more than 12 million identification numbers for Apple iPhones, iPads and other devices […]

Read More…

Shifty, but secure eyes

A biometric security system based on how a user moves their eyes is being developed by technologists in Finland. A biometric security system based on how a user moves their eyes is being developed by technologists in Finland. Writing in the International Journal of Biometrics, the team explains how a person’s saccades, their tiny, but […]

Read More…

10 Tips For Protecting Mobile Users

Mobile employees, devices, and data need protecting. Here are 10 tips to make it happen. These days, every user is mobile. Laptops, smartphones, tablets, and constant connectivity have unshackled all of us from our desks. And thanks to the ready availability of apps and cloud services that blur the line between consumer and business tools, […]

Read More…

Higher retail wages correlate with lower levels of employee theft

A study co-written by a University of Illinois business professor shows that higher wages are associated with lower levels of employee theft, shedding light on the impact that compensation practices have on shaping employee honesty and ethical norms in organizations. Using data sets from the convenience-store industry, Clara Xiaoling Chen, a professor of accountancy, and […]

Read More…

10 Ways Enterprises Can Battle Malware

As malicious code rapidly evolves, the National Institute of Standards and Technology is updating its guidance to reflect changes in the threat malware presents organizations. The “Unlike most malware threats several years ago, which tended to be fast-spreading and easy to notice, many of today’s malware threats are more stealthy, specifically designed to quietly, slowly spread to […]

Read More…