OFFICIAL WEBSITE OF THE CITY OF PROVIDENCE, RHODE ISLAND

PEMA Newsletters

December 2012: Cyber Crime and How it Affects You
Cyber crime is a term that covers a broad scope of criminal activity using a computer. Some common examples of cyber crime include identity theft, financial fraud, web site defacements and cyber bullying. At an organizational level, cyber crime may involve the hacking of customer databases and theft of intellectual property. Many users think they can protect themselves, their accounts, and their PCs with just anti-spyware and anti-virus software. Cyber criminals are becoming more sophisticated and they are targeting consumers as well as public and private organizations.

November 2012: Tips for Secure Shopping Online During the Holiday Season
Cyber Monday (the Monday after Thanksgiving) and online shopping throughout the entire holiday season have become increasingly popular in recent years, and the trend is expected to continue this season. According to MarketLive, an e-commerce software and solutions provider, online shoppers in the U.S. are projected to spend more than $54 billion this holiday season, nearly a 17 percent increase over the $47 billion spent last year.

October 2012: National Cyber Security Awareness Month - Tips for Staying Safe Online
October is National Cyber Security Awareness Month. This is an effort coordinated by the U.S. Department of Homeland Security, the Multi-State ISAC, and the National Cyber Security Alliance along with many governments, businesses, schools, and other groups to help improve cyber security preparedness. It's a great time to evaluate your online activities and take some basic steps to protect yourself.

September 2012: Using Encryption to Protect Data
According to the Privacy Rights Clearinghouse, more than 19 million records have been involved in a data breach so far this year. Protection of data requires multiple layers of defense, and the use of encryption to secure sensitive data is a critical tool in this multi-layered approach.

August 2012: Securing Your Wireless Network
Wireless networks are not as secure as the traditional "wired" networks, but you can minimize the risk on your wireless network (at home or at work) by following these tips.

July 2012: Managing Your Digital Footprint - Think Before You Post
If you're not familiar with the phrase "digital footprint," it's important that you become aware of what it is and how it impacts you. Digital footprint refers to the compilation of content on the Internet that can be associated with you and, thus, potentially available by anyone performing a search on you.

June 2012: Social Engineering - You are at Risk
The term "social engineering" refers to an attempt to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals. Most users should be familiar with email phishing scams (a form of social engineering) and have been taught not to open attachments from unknown or untrusted sources or to visit untrusted web sites.

May 2012: Creating a Cyber-Secure Environment at Home
Most workplaces have cyber security policies, processes, and technologies. You can create a more cyber-secure environment at home by implementing similar strategies.

April 2012: Creating a Secure Password
Your password is more than just a key to your computer or online account. It is a gateway to all of your important information. If your password falls into the wrong hands, a cyber criminal can impersonate you online, access your bank or credit card accounts, sign your name to online service agreements or contracts, engage in financial transactions, or change your account information.

March 2012: Mobile Apps and How To Use Them Safely
The use of mobile applications (apps) is increasing in parallel with the increased use in mobile devices. The continued growth of mobile apps requires a spotlight on security. The risks include access to information such as physical location or contacts lists, as well as the ability for the apps to download malware, such as keyloggers or programs that eavesdrop on phone calls and text messages.

February 2012: Securing Your Web Browser
Web browsers and related plug-ins are primary tools for interacting with the Internet, making them prime targets for cyber attacks. It is important to understand the risks and know what steps you can take to help minimize the likelihood of a successful attack.

January 2012: Cyber Security Emerging Trends and Threats for 2012
During 2011, cyber security incidents included theft of intellectual property and government data, hacktivism, malware targeting mobile devices and a resurgence of the Zeus Trojan, which targets financial information. Protecting against these attacks was a key challenge for organizations of all sizes in both the public and private sectors.

MS-ISAC Newsletters





JOBS AVAILABLE NOW!

ProvConnex - How may we help you?

OPEN DATA PORTAL

Transit Providence | RIPTA

Most Requested Online Services


Translate ProvidenceRI.com



Bookmark and Share

ACCESSIBILITY