|

Security of Mobile Communication Devices

From the Desk of Chad M.  Barr, CISSP, CISA All This Functionality in One Device! Mobile communication devices (includes Blackberrys, iPhones, smart phones in general) have become indispensable tools for today’s highly mobile society. Small and relatively inexpensive, these multifunction devices can be used not only for voice calls but also text messages, email, Internet…

|

Securing Your Laptop

From the Desk of  Chad M. Barr Laptops are increasing in popularity for both business and personal use. The portability of laptops makes them extremely convenient. However, we must also be aware of the security risks from the loss or theft of laptops, and take proper precautions. The potential loss is twofold; the loss of…

|

Protect Your Child Online

From the Desk of  Chad M. Barr, CISSP, CISA October is National Cyber Security Awareness Month. This national campaign’s goal is to increase the public’s awareness of cyber security and cyber crime issues so users can take precautions to avoid these threats on the Internet. Children present unique security risks when they use a computer….

|

Staying Safe on Social Networking Sites

From the Desk of Chad M. Barr, CISSP, CISA The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces security risks, so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as “friend-of-a-friend” sites, build upon the…

|

Erasing Information and Disposal of Media

From the Desk of Chad M. Barr How can I be sure files are erased? Data can be stored electronically in multiple formats and locations. Data sometimes includes sensitive documents or possibly data containing personally identifiable information such as a social security number, credit card information, or health related information. For example, the initial information…