|

Staying Safe on Social Networking Sites

From the Desk of Chad M. Barr, CISSP, CISA The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces security risks, so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as “friend-of-a-friend” sites, build upon the…

|

Erasing Information and Disposal of Media

From the Desk of Chad M. Barr How can I be sure files are erased? Data can be stored electronically in multiple formats and locations. Data sometimes includes sensitive documents or possibly data containing personally identifiable information such as a social security number, credit card information, or health related information. For example, the initial information…

|

How Anonymous Are You?

From the Desk of  Chad M. Barr, CISSP, CISA What information is collected? When you visit a web site, a certain amount of information is automatically sent to the site. This information may include the following: IP address – Each computer on the internet is assigned a specific, unique IP (internet protocol) address. Your computer…

|

Why Cyber Security is Important

From the Desk of Chad M. Barr, CISSP, CISA What is cyber security? It seems that everything relies on computers and the Internet now — communication (email, cell phones), entertainment (digital cable, MP3’s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much…