Category Archives: Security Articles

Failing To Be Cyber Secure: How Much Can It Cost You?

If you’re Target, the answer is about a quarter billion dollars. That’s BILLION, with a “B.” The  retailer giant recently settled its data breach for $18.5 million, but that settlement is on top of the nearly $202 million the company says the breach cost. A recent QuickRead on FacilitiesNet lists some… Read more »

The Risk with Content Management Systems

The federal Office for Information Security in Germany (BSI) together with the “Fraunhofer SIT” and “]init[ AG” released a study on the risk with common content management systems (CMS) for websites. A CMS is typically used to a…

10 Smart Tech Habits to Pass On To Your Kids

We teach them how to drive, how to cook, and how to find their way through tough situations. But parents today have added another task to their “essential parenting” list they must impart and that is: good tech habits. The role of technology in families is only growing. Tech has become a rather hefty line Read more…

7 Tips: How to Raise a Leader in a ‘Follower’ World

Leadership training isn’t exclusive to adults. And in today’s online culture of “following” and digital profiles, it’s never too early to teach a child (aka digital native) how to think, act, communicate, and process information online with a leader’s perspective.  Oh—and don’t get discouraged—they may roll their eyes when you start talking about lofty things Read more…

Why it’s Critical to Protect Data on Digital Devices

When devices are lost or hacked and your data is exposed, not only is this a pain to deal with, but you could become a victim of identity theft. Not only do victims of identity theft suffer loss of time  but they also lose money that may not be able to be recovered . In Read more…

How to Coach Your Teen through the ‘Selfie’ Craze

Kids call them “selfies” while parents (likely) call them “image overkill.” A “selfie” is simply a photo that teens (mostly girls) take of themselves while holding the mobile camera at arms length. They often come in floods online—sometimes dozens a day depending on a teen’s exuberance. Posting photos is nothing new, however, selfies are exploding Read more…

Keeping Your Small Business Safe from Cyberattacks

Recently, a story ran in CNNMoney.com about the cyberattack experience of a small online retailer. Not only was their site victimized once, but twice in the span of four years. Over 1,000 dollars later, the owners were able to get back on their feet, but many other small businesses won’t be so lucky. Today, cyberattacks Read more…

Plug Your Kids Into the Power of Eye Contact

Reminding parents and kids to stop and make eye contact should not be worthy of a blog post. I mean, didn’t we master this skill somewhere in the 16th century? Unfortunately, in today’s gadget-happy culture, this lost art is positioned for a long-overdue comeback. We talk on this blog a lot about teaching kids to navigate Read more…

Microsoft Security Advisory (2854544): Update to Improve Cryptography and Digital Certificate Handling in Windows – Version: 1.0

Revision Note: V1.0 (June 11, 2013): Advisory published.
Summary: Microsoft is announcing the availability of an update as part of ongoing efforts to improve cryptography and digital certificate handling in Windows. Over the co…