Here are some tips to follow to protect your personal and work related data.
Use and maintain anti-virus software and a firewall - Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall.
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.
Knowing what’s important to credit union professionals is key to providing the information and news coverage needed in the financial services industry. Having a “finger on the pulse†is the best way to describe the formation of CUInfoSecurity.com’s inaugural Advisory Board.
The Chief Security Officer (CSO) oversees and coordinates security efforts across an organization including departments such as information technology, human resources, communications, legal, finance management and other groups, and identifies and establishes security initiatives and standards throughout the...
Certifications are highly sought after by job seekers and employers. They are a major criterion for hiring qualified security professionals, a practice followed by most companies. The challenge for employers, and the key point, is to understand what a specific certification signifies- If a certification along with...
The focus on information security is not just a passing phase”we have seen it sustained over the past couple of years, and it continues to grow. So you can now begin to place yourself in a position to become that ideal security professional as this role evolves and expands more so for banking and financial...
The focus on information security is not just a passing phase—we have seen it sustained over the past couple of years, and it continues to grow. So you can now begin to place yourself in a position to become that ideal security professional as this role evolves and expands more so for banking and financial...
Certifications are highly sought after by job seekers and employers. They are a major criterion for hiring qualified security professionals, a practice followed by most companies. The challenge for employers, and the key point, is to understand what a specific certification signifies- If a certification along with...
John Smith, VP Technical Services at an Investment Bank was interviewing a senior information security professional on the phone last month in April, 2007 during the phone interview the candidate suddenly requested John to be on hold as another call was coming through.
A checklist for professionals aspiring to be Leaders and Security Rock Stars
Love What You Do - Have a passion for information security. Do not consider getting in the field because earning potential is high or because your friend is in security.
As an active job seeker you may post your resume in several job boards providing personal contact information including your social security number and more... speak with innumerable recruiters discussing potential job opportunities revealing more information about yourself. Chances are you don't give this everyday...
A new chief information security officer should approach their role determined to make a difference to the business they are supporting. This advice comes from someone who knows how to make a difference, Steve Katz, who was the first Chief Information Security Officer (CISO) of a major financial institution,...
ALAN ZAPANTA(ISMG): Now, recently, you have been conducting some compelling research regarding the skill level that the information security industry demands and the current curriculum that many colleges ascribe to. Could you please give us a brief overview?
RICHARD SWART: Yes. I did this research in...
Once an isolated planet, information security has now become a universe in itself! Today, security is acknowledged as an integral component for corporate success leading to the increase in demand for highly-skilled security professionals. A recent study conducted by IDC for the International Information Systems...
Determining if a candidate possesses the skills necessary to fill an information security position effectively before hiring him/her is not a trivial task. There are many methods one can use to gauge the effectiveness of a candidate's background.
It is important to note that for some positions, it might be very...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.