article thumbnail

Understanding and Recognizing Tech Abuse

SecureWorld News

A common example of this is surveillance. We normalize the use of surveilling and tracking young people through "parentware" or spyware (software which allows someone to see what someone else is doing on their device) and apps which enable the tracking of someone's location. Earlier, I discussed the normalization of surveillance.

article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

With control of the exec’s smart speaker secured, the attackers were able to achieve their objective to eavesdrop on the CFO’s private conversations. This is why it is important to build employee training for consumer IoT devices into security awareness training programs.” This is a sign of IoT attacks to come.

IoT 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 Cyber Security Courses Online For Everybody

Spinone

Security Awareness Training from Advisera Advisera offers lots of tools like books, courses, and guidelines for those who want to know more about compliance standards and become security-aware. Network Security: In this module, you will learn more about how to secure network: firewalls, password managers, and more.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Evaluate the network architecture: Determine whether the SaaS provider uses network segmentation to separate client data and apps from one another, reducing the risk of unauthorized access and lateral movement in the event of a security breach. Teach them how to verify the sender’s address and URL.

Risk 108