Cisco Blogs

Search Results

308 posts found

Thoughts on the cybersecurity task force

…e are areas where we know we need to make improvements, i.e. FISMA reform and data breach notifications. Part of cybersecurity, sure, part of a bigger picture, yes. But, to what end? We should not be so opposed to regulation when addresses the cyber threat, whether it be for government agencies or private sector, as explained here. If the government is going to form a Cybersecurity Task Force, and spend time on it, the outcome should include both…

Read More >>

Tags: , , , , , , , ,

NCSAM Tip #10: Cloud Security for Everyone

…ss to the cloud by using VPN connections, encrypted web traffic (https/SSL), and secure wireless access. 3. Data security: Consumers expect that cloud service providers do a good job to protect data safety and privacy. However, a series of recent high profile break-ins show that hackers can actually accomplish massive intrusions by reaping information on millions of user accounts and credit cards. Action: Ask your cloud service provider how secur…

Read More >>

Tags: , , , ,

How Safe is Your Phone System?

…nitor VoIP traffic. A secure phone system, such as the Cisco Smart Business Communication System, should include security devices like a secure router. If you use a hosted IP phone system, make sure you know what security measures your provider has in place to protect your data network from VoIP threats. October is National Cyber Security Awareness Month, a good reminder that in this digital age, phone calls and voicemail messages are just data t…

Read More >>

Tags: , , , ,

NCSAM Tip #9: Anonymity Online — Profile Management for Personal Safety

Social networking sites like Facebook are great tools for connecting with friends and keeping up-to-date with the good and bad things that are going on in your social circles. Unfortunately, the kind and amount of personal information that makes for great social networking can be used by people with bad intentions to cause real, physical harm. Sound far-fetched? After a referee made a controversial call in a baseball game, someone with his same…

Read More >>

Tags: ,

NCSAM Tip #8: Patch Verification with MBSA and Cisco IOS Software Checker

For Cyber Security Awareness Month I’d like to address patching; more specifically, verifying patches in your environment. Patching is a big part of any security policy. It’s also very important to verify that the patches and updates deployed have actually been installed. Whether you have one host or thousands, using a tool to scan your environment to verify those patches can save a lot of time and serve as a check on your patch p…

Read More >>

Tags: ,