Page 95 - CDM Cyber Warnings February 2014
P. 95
Step #3: Stay informed company called �innovative � by eWeek and a �Security Startup
Beyond the afore-mentioned Privacy Rights Clearinghouse here to Watch� by CIO Magazine. A long-time participant and
are two non-profit organizations that offer extensive online observer of the Internet and mobile tech sectors, Rafter has
resources for your privacy education: contributed to and been quoted by a range of media including
CNN, MACWORLD, USA Today, Wall Street Journal and The
ConnectSafely Washington Post. Email him at [email protected]
(Web: http://www.connectsafely.org/
Twitter: @ConnectSafely)
“2014 marks the
National Cyber Security Alliance
(Web: http://staysafeonline.org/ beginning of a
Twitter: @STOPTHINKCONNECT)
Includes a valuable collection of tips and resources for everyone new era whereby
from parents to businesses to �Stay Safe Online. �
IT security professionals
Step #4: Get Involved
Privacy is a participant sport� will need to become
Whether by participating in the NCSA� s annual Data Privacy
Day, running a �Parents Privacy Primer � at your kids � school, Counterveillance experts”
or ensuring your elected officials are aware of your concerns, be
sure to join with others in the collective movement to preserve
personal and business privacy. The Electronic Frontier
Foundation (Web: https://www.eff.org/, Twitter: @eff) is at the
forefront of organizations that are fighting illegal surveillance.
Information Security Professionals Must Lead The Way
While many information security professionals may feel that
they have their �networks� and data �all locked up and safe�, we�ve
all learned that the Bring Your Own Device (BYOD) and Mobile
Device Management (MDM) dilemmas proved otherwise.
These new developments opened the door to new ways of
thinking about internal network security, guest access, 802.1x
and so much more. It also led to a new wave of InfoSec software,
hardware, appliances, switches; wired and wireless routers and
endpoint security solutions that now take into account the risks
inherent in mobile computing.
Now, we face even more challenges both on the personal privacy
front as well as for data loss prevention (DLP) whereby yet
another wave of counterveillance solutions will begin to emerge–
from more easily deployed encryption solutions that now take
into account the risk of eavesdropping to endpoint security
software with built-in surveillance protection.
About the Author
Patrick Rafter is VP of Marketing at SnoopWall
(www.snoopwall.com), privacy and cybersecurity software
CYBER DEFENSE MAGAZINE - ANNUAL EDITION 95