Get your brain in motion

Tag: security

Executives Handling Confidential Information

The article “Inside the Executive Suite” published by Armada Corporate Intelligence features how to handle confidential information.

1.Market-Moving and Insider Information

The first element to consider is whether we are dealing with legally relevant information. In case of positive answer, confidentialty is strictly required.

2.Handling Business Strategy

Be particularly careful if you deal with information that your organization does not want disclosed because it changes the business and competitive environments, typically for the worse.

3.When You Can’t Say, or Don’t Know

The golden rule is to never lie to people. One way to do so is to use a non-committal response, in order to protect your reputation and prevent you from lying.

To know more read the full article.

 

 

 

 

 

 

 

 

Image source: Pixabay (CC0)

Would you give away your home keys to some random stranger? I bet not. Curiously enough, when it comes to internet personal security, people usually lower their guard, thus giving possibility to malwares, Trojans or identity thieves to have access to private data. Justin Schuh, one of the top Google’s information security engineers, here explains in five simple tips how to sensibly reduce risk of infection while surfing on the internet.

Because, as Jodi Rell once stated: “at the end of the day, the goals are simple: safety and security”

Never lower your guard

Image source: Bykst  (CC0 1.0)

Security and Data collection

We do not know what kind of data cell phone companies are collecting. In this TED talk Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code – a detailed, nearly minute-by-minute account of half a year of his life.

Stay secure in cyberspace

Many people now understand the role of personal hygiene in maintaining good health. Until the 19th Century this was not the case everywhere and life expectancy was considerably shorter due to contagious disease, plagues, contaminated food and water, etc.
While viruses and plagues continue to exist in real life, a similar situation arose in cyberspace in the form of malicious software.
The explosive growth in the adoption of electronic devices by the general population (computers in various forms, smartphones and tablets) is creating and environment where some measures of digital hygiene (such as maintaining strong passwords, carrying out backups, not becoming a victim to phishing, etc.) are needed to protect the devices and the data they contain as well as their owners.

Ed Gelbstein, in his last book published with Bookboon, describes in simple, non technical language a collection of good practices that can be considered as sensible good hygiene to adopt in cyberspace.

The book “Good digital Hygiene” is downloadable for free at Bookboon.com

good-digital-hygiene