Iowa state lawmakers are working on a bill that would ban government entities in the state from installing video or audio monitoring devices in public bathrooms, locker rooms or showers in locations such as libraries, schools or other government offices.
People who identified themselves in a survey as “tech savvy” were 18 percent more likely to be victims of online identity theft. In addition those who said they had Ph.Ds were more frequently victims than high school graduates
Cybersecurity experts recommend that smartphone owners take a number of steps to keep their mobile devices safe and secure. These include using a pass code to gain access to the phone, as well as regularly updating a phone’s apps and operating system. Many Americans, however, are not adhering to these best practices, according to a Pew Research Center report.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!