Digital and Mobile Security for Mexican Journalists and Bloggers
|
|
|
- Noel Hodge
- 10 years ago
- Views:
Transcription
1 Digital and Mobile Security for Mexican Journalists and Bloggers A project of Freedom House and the International Center for Journalists Results of a survey of Mexican journalists and bloggers Prepared by Jorge Luis Sierra ICFJ Knight International Journalism Fellow
2
3 Results of a survey of Mexican journalists and bloggers Prepared by Jorge Luis Sierra ICFJ Knight International Journalism Fellow
4 4 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS SUMMARY A new survey of 102 journalists and bloggers in 20 Mexican states shows nearly 70 percent have been threatened or have suffered attacks because of their work. In addition, 96 percent say they know of colleagues who have been attacked. Respondents to the survey also say they view cyber-espionage and -account cracking as the most serious digital risks they face. And while nearly all have access to and rely on the Internet, social networks, mobile phones and blogging platforms for their work, they also admit that they have little or no command of digital security tools such as encryption, use of virtual private networks (VPNs), anonymous Internet navigation and secure file removal. The results of this survey show the urgent need to introduce Mexican journalists and bloggers to new technologies and protocols and help newsrooms develop a culture of digital-security awareness to counter increasingly sophisticated threats and attacks from both governmental agencies and criminal organizations. INTRODUCTION Advances in computer and mobile technology, the expansion of the Internet and the development of social networks and digital tools have removed many geographic, social and political barriers to the exchange of news and information. At the same time, these developments have created new areas of vulnerability for media professionals and bloggers who often are not fully aware of how these new technologies can threaten their privacy and security. This is particularly true in countries where citizens face major security challenges such as organized crime groups and corrupt officials. In Mexico in particular, digital and mobile insecurity has become a new and uncontrolled source of danger to the physical and psychological safety of independent journalists and bloggers alike. In September 2011, two bloggers who reported frequently about local crime particularly violent incidents related to drug trafficking were found hanged from a pedestrian bridge in Nuevo Laredo. This city is the turf of the Zetas, one of Mexico s most active and dangerous criminal organizations. A message left near the bodies warned that the same thing could happen to any Internet user who crossed that criminal organization. Those murders were followed by the killing of a journalist using the nickname la Nena de Laredo (the Baby of Laredo) who had posted entries against criminal activity on Nuevo Laredo en Vivo, a social media forum. Professional journalists also are at risk. In June 2012, Victor Manuel Baez, an editor working for reporterospoliciacos.mx, a website covering crime in Veracruz, was kidnapped when he left his office in that city. He was found dead hours later. A reporter working in the southern state of Michoacán
5 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS 5 says members of a criminal organization are sending threatening text messages to his phone in an effort to force him to become a public relations officer for them. These events are among the most extreme attacks so far by criminal elements against journalists and bloggers in Mexico. There also have been incidents involving official surveillance of Twitter users who were suspected of terrorism. In September 2011, the state of Veracruz initiated a terrorism case against two Twitter users, accusing them of spreading rumors about a school attack. Two months later, the Mexican Federal Police arrested a Twitter user because he posted a comment about flying officials minutes before the Interior minister died in an airplane crash in Mexico City. Reporters investigating corruption and human rights abuses in Chiapas, where government forces have intermittently battled guerrillas since the 1990s, say they have been under continuous electronic surveillance over the last two years. These events indicate that both officials and criminal organizations monitor social networks to see what journalists and bloggers post, often responding to stories and information they don t like with harassment, threats or violence. Given the level of insecurity surrounding the use of digital and mobile technology by journalists and bloggers, protection of users identity and privacy is now crucial, particularly when citizens and journalists use online platforms, social networks and mobile devices to post comments or reports about crime, corruption or violence. With this in mind, a group of journalists and bloggers who cover human rights issues, crime, corruption and the impact of state activities against criminal groups were surveyed to see if they understand the risks and threats they face when using digital and mobile technology. The goal: to develop simple protocols and identify the best tools to help them better protect themselves so they can continue to serve the public interest. The survey asked questions such as: How do you rate your ability to use digital and mobile tools? How do you rate your ability to use risk-reduction tools and strategies when working on computers, using cellular phones or navigating the Web? How much do you mix personal information with professional activity when using social networks like Facebook or Twitter? How vulnerable do you think you are to physical and digital risks and threats? Have you been threatened or attacked because of your professional online/mobile activity? The information generated by this survey will be used to help bloggers and journalists become more aware of their digital and mobile risks and the need to use security tools, protocols and strategies to reduce those risks as they pursue investigative stories.
6 6 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS METHODOLOGY A 21-question electronic survey was distributed to a group of trusted journalists, bloggers and human rights activists in Mexico. All of the participants use computers, the Internet and an array of digital tools and mobile devices to report on crime, corruption, violence and human rights issues. More than half say they cover corruption, victims of violence, abuses by authorities and human rights issues. Ten percent report on drug trafficking. Coverage of these sensitive topics makes those journalists and bloggers even more vulnerable to electronic surveillance and other digital attacks. Journalism organizations and networks, human rights groups and independent journalists helped to generate the list of journalists and bloggers for the survey. In October and November 2012, an electronic link to the survey was distributed to networks of journalists, particularly in the Mexican states most affected by drug violence and where journalists and bloggers have been under stress due to a wave of murders, kidnappings, physical attacks and death threats. The results of this survey are not a statistical representation of the general state of security for journalists in Mexico. However, they offer quantitative evidence of the digital and mobile vulnerability of journalists and bloggers working in high-risk areas of Mexico. SURVEY PARTICIPANTS PER STATE AND SEX 60 Male Female Distrito Federal Chihuahua Sinaloa Veracruz Oaxaca Tamaulipas Morelos Jalisco Guerrero Durango Chiapas Baja California Zacatecas Puebla Nayarit MIchoacán Hidalgo Colima Nuevo León Coahuila Total
7 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS 7 The selected group is representative of professional journalists and bloggers who regularly use digital and mobile tools and are deeply involved in adapting to one of the most dangerous reporting environments in the world. Some of them have participated in the Cobertura Segura course, a program organized by ICFJ and the University of Guadalajara, to train journalists to use a combination of risk-reduction strategies and auto-protection protocols. POSITION Spokeperson Activist/ Journalist Photojournalist Student Activist Blogger Staffer blogger Freelancer Staffer Journalist The results of this evaluation will be used to design an online course and in-person workshop to train participants to develop and use digital and mobile risk-reduction strategies and protocols. A total of 102 journalists and bloggers from 20 Mexican states, including the Federal District of Mexico (Mexico City), responded to the survey. Forty percent of the respondents were female. Almost 80 percent of the answers came from participants who received a direct invitation to participate in the survey via electronic mail. Twelve percent of the answers came from participants invited through a Facebook group. The rest of the answers were obtained from invitations sent by Twitter and in person. Nearly 60 percent of the participants are staff journalists working for media organizations. Another 23 percent are free lancers. More than 5 percent of the respondents are bloggers, 7 percent are human rights activists and 5 percent are students. RESULTS PHYSICAL RISKS Almost 70 percent say they have been threatened or been the victim of an attack as a journalist or blogger. More than 20 percent say they have been threatened or attacked recently. Nearly 10 percent of all participants say they recently were attacked physically. Thirty percent of respondents, half of them working in Mexico City, said they have never been attacked, which signals that journalists and bloggers working in Mexico City are relatively safer than those working in other areas of Mexico. Even so, half of the 32 participants from Mexico City say they have been threatened or attacked. Twenty-seven percent say physical threats are the most serious risk for journalists and bloggers in their communities. Eleven percent see lawsuits and murders as the biggest risks. Personal and family security are the two biggest concerns for those
8 8 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS surveyed, while 11 percent think information security and the safety of colleagues are the most important concerns. Forty-nine percent report that they, their friends or family members have received threats. HAVE YOU SUFFERED THREATS OR ATTACKS? No 31% Yes 69% TYPES OF ATTACKS YOU HAVE SUFFERED Physical attack None Threats by SMS Lawsuit Infected computer Stolen Computer Kidnapped Arrested Hacked accounts Threats by Threats by phone Threats vs friends or family Threats in person 0% 5% 15% BIGGEST PHYSICAL RISK Being beaten Arrest Kidnapped by criminals Being killed FRECUENCY OF THREATS OR ATTACKS Never Long time ago Recently Often Often and Recently 0% 5% 15% 30% 35%40% The perception of risk is high due to past experiences in their communities. More than 95 percent of respondents say that other colleagues in their communities have been attacked. Thirty percent say their colleagues were frequently and recently attacked. Lawsuit Multiple risks Defamation campaign Threats 0% 5% 15% 30% None of the respondents claimed they face a risk of extortion. MAIN SECURITY CONCERNS HAVE YOUR COLLEAGUES BEEN THREATENED OR ATTACKED? No 4% Yes 96% Legal security 2% Sources safety 5% Colleagues safety Multiple concerns Family safety 21% HAVE YOUR COLLEAGUES BEEN THREATENED OR ATTACKED? Recently 29% Never 4% Often Information security Personal safety 31% Often and recently 18% Long time ago 24%
9 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS 9 DIGITAL RISKS Participants say cyber-espionage and -account cracking are the most serious digital risks they face. These journalists and bloggers rely heavily on the Internet and actively use digital tools to contact sources and share information. They regularly use the Internet and various electronic and mobile devices to gather and transmit information. About 12 percent fear their social-network accounts have been compromised by a digital attack. About 8 percent worry that their websites will be attacked. Six percent identify information theft as a serious risk. Because all the survey participants rely on the Internet, and officials and criminal organizations monitor their electronic, digital and mobile activity, it seems certain that most journalists in Mexico are affected by digital insecurity. RELY ON THE INTERNET Frecuent 8% Regular 2% Very frecuent 90% BIGGEST DIGITAL RISK Sources revealed 2% Information theft 6% Combo risks 7% Equipment thefts 7% Hacking of websites 9% Personal information revealed 1% As mentioned, more than half of the participants cover corruption, victims of violence, abuses by authorities and human rights issues. Ten percent of those surveyed report on drug trafficking. Coverage of these sensitive topics makes those journalists and bloggers even more vulnerable to electronic surveillance and other digital attacks. USE OF TECHNOLOGY Hacking of personal accounts 35% Cyberspying 33% Based on the survey results, Mexican journalists and bloggers seem to rely on mobile technology to gather and report news and information. Seventy percent of participants say they use portable devices for their work. One out of every three participants uses multiple technologies: computers, laptops, tablets, cell phones and cameras. At the same time, most also rate their skill level in digital technologies as low. This means journalists and bloggers need to be introduced to new applications and strategies to improve their safety
10 10 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS as they use their devices to report on crime, violence, human rights and corruption. RELY ON TOOLS Cell phone Cameras 2% 7% Recorder 12% Desktop computer 22% Tablet 2% Multiple devices 30% Portable computer in the headers. Only 3 percent of participants use encrypted services such as Hushmail or Rise-up. USE Report incidents 1% Conduct interviews 14% Receive and provide information 56% Multiple use 29% USE OF All the survey participants use to obtain and share information. Of that group, 56 percent say they use to deliver and receive information. Thirty percent use services for multiple purposes, and 14 percent use to conduct interviews. Thirty-eight percent use Gmail as their primary service. This is positive since Gmail doesn t show senders IP address in the headers, provides a Secure Socket Layer (SSL) with navigation, and offers an alert when the is accessed from an unknown or infrequent IP. However, 60 percent of the survey participants say they use services that show the users IP address in the headers, putting them at risk. Twenty-seven percent use Hotmail, which has an SSL, but shows the senders IP address PROVIDER me.com 1% Hushmail 1% Riseup 1% icloud 1% Prodigy 1% Institutional 15% COMMAND OF SECURITY TOOLS Gmail 37% Yahoo 16% Hotmail 27% Although participants perceive information theft as a major risk, more than 60 percent report that they have little to no understanding of encryption technologies. Only about 15 percent say they have a good command of security tools like data encryption, use of VPNs, anonymous Internet navigation and secure file removal. One positive finding from the survey: More than 50 percent of participants say they can create secure passwords. The following
11 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS 11 tables offer a detailed view of these vulnerabilities: DATA ENCRYPTION More than 60 percent of participants report little or no skill at data encryption. Tools to encrypt data would be extremely valuable for journalists and bloggers who work on such topics as organized crime, corruption and victims of violence to keep their sources, sensitive documents and investigations safe. DATA ENCRYPTION 35% 30% 15% 5% 0% None Poor Average Acceptable Excellent ANTIVIRUS SOFTWARE It is encouraging that most participants have a good command of antivirus software. It can prevent their computers and mobile devices from being infected by malware. Nonetheless, 40 percent of the survey participants have little or no command of antivirus software. ANTIVIRUS SOFTWARE 30% 15% 5% 0% None Poor Average Acceptable Excellent ANONYMOUS INTERNET NAVIGATION More than 70 percent of respondents say they are not using tools to remain anonymous on the Internet. It is crucial for journalists and bloggers to remain anonymous to maintain their physical, psychological and digital security, since criminal organizations and intelligence offices now closely monitor the activity of citizens and journalists on the Internet. Journalists and bloggers would benefit immediately from learning how to access and use these tools, particularly the TOR platform in computers and mobile devices. ANONYMOUS INTERNET NAVIGATION 30% 15% 5% 0% None Poor Average Acceptable Excellent SECURE FILE STORAGE Two Milenio TV reporters were kidnapped by a criminal organization in March 2010 because the reporters had taken pictures of military commanders at a ceremony. Because the stored pictures were found, the reporters were accused of being associated with a rival criminal organization that included former soldiers. This was a harsh reminder for reporters working in dangerous zones of the need to protect their files.
12 12 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS More than 50 percent of the participants say they have little or no experience with tools to securely store and erase documents. Knowing how to store sensitive documents securely and prevent them from loss, theft or unauthorized access is an important digitalsecurity skill. SECURE FILE STORAGE 40% 35% 30% 15% 5% 0% 30% 15% 5% 0% None Poor Average Acceptable Excellent SECURE FILE REMOVAL 35% None Poor Average Acceptable Excellent VIRTUAL PRIVATE NETWORKS More than 80 percent of participants have little or no familiarity with or skill in using virtual private networks (VPNs). VPNs connect users to a remote location such as a corporate server, providing anonymity and encryption. Media companies use these networks to securely connect reporters, photographers and editors to remote and centralized locations. This is particularly useful for reporters and photographers who report from dangerous areas and need to transmit stories and other information to the media company s headquarters. USE OF VPN 70% 60% 50% 40% 30% 0% None Poor Average Acceptable Excellent STRONG PASSWORDS Sixty percent of participants rate their ability to create strong passwords as above average. Strong passwords are the most basic and fundamental element of digital security. STRONG PASSWORDS 40% 35% 30% 15% 5% 0% None Poor Average Acceptable Excellent USE OF SOCIAL NETWORKS Most participants say they rely on social networks to do their work as journalists and bloggers. However, they lack the skill to make full use of those social networks. One serious problem is that 50 percent of the survey participants say they mix personal and professional information on Twitter and Facebook. Just 13 percent say they use Facebook
13 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS 13 for professional reasons only. Combining personal and professional information is a dangerous practice because it can provide an opening into the journalist or blogger s personal life and activities. Although 90 percent of the survey respondents say they use social networks (Twitter, Facebook, Google+, YouTube and Flickr), less than 30 percent report an advanced-level use of those tools. They say Twitter is the social network with which they are most familiar. More than 35 percent say they use Twitter and Google+ only for professional reasons. PERSONAL VS PROFESSIONAL USAGE Flickr YouTube Google + Facebook Twitter 0% 40% 60% 80% 100% Professional Personal Mixed SKILLS IN SOCIAL NETWORKS Flickr YouTube Google + Facebook vices to provide and receive information. Almost all of the survey respondents (90 percent) access these systems from computers and mobile devices, with most using Facebook s instant messaging function. However, many also say they don t use security systems to encrypt information during instant messenger exchanges. INSTANT MESSAGING SERVICE Direct Messages Twitter 2% Other 2% None 2% Skype 3% Yahoo Messenger 4% Multiple use 5% Facebook chat 37% Windows Live Messenger Google Talk Among Mexican journalists, Whatsapp has displaced Facebook chat as the preferred messaging tool among mobile-device users. It can facilitate communication between journalists and citizens in real time. Twelve percent of participants also say they use Blackberry PIN, which is a positive development since that service automatically encrypts all PIN messages. MOBILE MESSAGING SERVICE Twitter 0% 40% 60% 80% 100% Basic Intermediate Advanced INSTANT MESSAGING SERVICES Journalists and bloggers also rely heavily on instant messaging ser Skype 1% Viber 1% None 2% Twitter 2% SMS 2% Yahoo Messenger 3% Windows Live Messenger 6% Various 8% Whatsapp 31% Facebook chat 19% Google Talk 13% Blackberry Pin 12%
14 14 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS BLOGGING Almost fifty percent of participants say they have an active blog. The rest do not blog or have inactive blogs. Wordpress is the most commonly used platform, followed by Tumblr and Posterous. According to the survey, Wordpress and Blogger are used more often for professional blogs. Posterous and Tumblr are used more for personal blogs. About 30 percent of the respondents mix personal and professional information on their blogging platforms. USE OF A BLOGGING PLATFORM Inactive 4% None 47% Active 49% BLOGGING PLATFORMS USAGE Tumblr Typepad Posterous Blogger Wordpress 0% 40% 60% 80% 100% Personal Professional Mixed RECOMMENDATIONS Journalists and bloggers in Mexico urgently need to increase their digital and mobile security. Although it is impossible to eliminate all risks, it is essential to help journalists and newsrooms adopt new applications and strategies that are designed to minimize their vulnerability as they cover high-risk topics such as drug trafficking, organized crime, corruption, abuse, violence and human rights abuses. It also is essential for Mexican journalists, bloggers and newsrooms to connect with each other and with others around the world dedicated to helping journalists stay ahead of constantly evolving digital threats. Suggested steps for organizations working with media and journalists in areas where secure communications can provide more protection from risk: Work with media companies to help them better understand the online and mobile threats their employees face and improve their editorial and non-editorial security systems. Help their newsrooms adopt a culture of security awareness that includes digital vigilance and a readiness to adopt and adapt the technologies and strategies needed to maintain cyber-security. Encourage media companies to increase resources devoted to helping reporters, editors, photographers and producers maintain individual digital security. Build a community of mediasecurity experts comprised of Mexican computer engineers, journalists and bloggers who participate in the Hack/Hackers Mexico chapter to customize
15 DIGITAL AND MOBILE SECURITY FOR MEXICAN JOURNALISTS AND BLOGGERS 15 technology that helps to reduce the risks journalists and bloggers face when they work online or on mobile phones. Use social media, the Internet and existing networks to communicate the need for secure communications tools to media organizations, reporters, photographers and editors who work in dangerous zones. Invite journalists to form a network dedicated to online and mobile security. Offer more online and in-person programs that help journalists and bloggers embrace security tools such as encryption software and platforms, safe providers, secure storage and erasing of documents. These programs also should focus on increasing their ability to protect their identity and privacy by using anonymous Internet navigation systems in computer, portable devices and smart phones.
16 ACKNOWLEDGEMENTS Journalist Celia Guerrero assisted in researching and preparing this report. Special thanks go to the following organizations for their assistance in distributing the survey across Mexico: The National Center for Social Communication (Cencos), the Network of Journalists on Foot (Periodistas de a Pie), the Ciudad Juarez and Chihuahua Journalism Networks, Mexico Informate, the Press and Democracy Program of the Iberoamerican University and the Chiapas College of Journalists and Communicators. This report was made possible thanks to support from the U.S. Agency for International Development.
MIGRATION FACTS. Variable Impacts: State-level Analysis of the Slowdown in the Growth of Remittances to Mexico
The Migration Policy Institute is an independent, non-partisan, and non-profit think tank dedicated to the study of the movement of people worldwide. The institute provides analysis, development, and evaluation
Catastrophe Risk Insurance Pools: Opportunities and Challenges for the Mexican States
Seminario sobre Modelos de Gestión Financiera del Riesgo de Desastres para las Entidades Federativas en México Mexico, D.F. 1 de diciembre de 2011 Catastrophe Risk Insurance Pools: Opportunities and Challenges
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
A Guide to Mobile Security For Citizen Journalists
A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile
University of Colima, México.
MEXICO COLIMA University of Colima, México. Government Offices, Old Situation Government of Colima State,, México A New Era Of Management for the Government of Colima A New Era of Management for the Government
2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
Social Media Use in Law Enforcement:
Research Crime prevention and investigative activities continue to drive usage. November Background and methodology Overview Social media is increasingly valuable to the way law enforcement professionals
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses October 2014 A Pilot Survey to Compile Cybersecurity Information In July 2014, the Ohio Division of Securities participated
Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
BlackBerry Enterprise Server Express. Why upgrade from your current BlackBerry experience?
BlackBerry Enterprise Server Express Why upgrade from your current BlackBerry experience? Introducing BlackBerry Enterprise Server Express BlackBerry software transforms your smartphone into a productivity
In 2015, just under half (43%) of the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014.
Contents Introduction... 1 Main findings... 2 Methodology... 3 Section 1. Device usage... 4 Section 2. Online and on the move: Internet activity... 6 Section 3. The connected treasure chest: what is stored
Perception and knowledge of IT threats: the consumer s point of view
Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of
Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI
Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved
Background. Executive Summary
Background The Interdisciplinary Research Centre in Cyber Security at the University of Kent in Canterbury recently launched a second online survey 1 in order to get a better picture of the prevalence
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
PARENTS AND PUPILS UNITED HERZLIA SCHOOLS (UHS) INFORMATION AND COMMUNICATIONS TECHNOLOGY AND SOCIAL MEDIA POLICY
PARENTS AND PUPILS UNITED HERZLIA SCHOOLS (UHS) INFORMATION AND COMMUNICATIONS TECHNOLOGY AND SOCIAL MEDIA POLICY Copyright 2014 UHS. All Rights Reserved. INFORMATION AND COMMUNICATIONS TECHNOLOGY AND
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens
The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
NORTON CYBERSECURITY INSIGHTS REPORT
NORTON CYBERSECURITY INSIGHTS REPORT Get informed about the truths of online crime and the personal impact it has on you Table of Contents > INTRODUCTION... 3 > WE KNOW THE RISK FOR ONLINE CRIME IS HIGH...
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
Your security is our priority
Your security is our priority Welcome to our Cash Management newsletter for businesses. You will find valuable information about how to limit your company s risk for fraud. We offer a wide variety of products
BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE
BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE About the Author. Acknowledgments. Introduction. Chapter 1 Understanding the Threats. Quantifying the Threat.
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
Questionnaire for compiling the 2011 Press Freedom Index The period runs from 1 December 2010 to 30 November 2011
Questionnaire for compiling the 2011 Press Freedom Index The period runs from 1 December 2010 to 30 November 2011 Give as many examples as possible. Answers must be limited to events that took place during
Criminal Justice System Reform
2014 NGO Submission to the UN Human Rights Committee on the List of Issues Prior to Reporting for the Periodic Report of Mexico. Citizen Observatory of the Criminal Justice Reform in Mexico aims to monitor,
TURN BACK CRIME. Global awareness campaign
TURN BACK CRIME Global awareness campaign ABOUT THE CAMPAIGN Together, we can turn back crime Turn Back Crime is a global awareness campaign developed by INTERPOL. Using a variety of media channels including
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Compilation of Results of a Pilot Survey of Cybersecurity Practices of Small and Mid Sized Investment Adviser Firms
Compilation of Results of a Pilot Survey of Cybersecurity Practices of Small and Mid Sized Investment Adviser Firms September 2014 rth American Securities Administrators Association www.nasaa.org About
Three Continuing Years of Proven Success!
Three Continuing Years of Proven Success! Thanks to your valuable participation, Mexico WindPower 2014 was a great success, consolidating its reputation as the most important wind power event in Mexico
2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
ANNUAL SURVEY ON INFOCOMM USAGE IN HOUSEHOLDS AND BY INDIVIDUALS FOR 2012
ANNUAL SURVEY ON INFOCOMM USAGE IN HOUSEHOLDS AND BY INDIVIDUALS FOR 2012 Infocomm Development Authority of Singapore 10 Pasir Panjang Road #10-01 Mapletree Business City Singapore 117438 Republic of Singapore
Certified Secure Computer User
Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because
This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.
FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
Youth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com
7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
Digital Consumer s Online Trends and Risks
Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
MOBILE MALWARE REPORT
TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores
HIPAA Notice of Privacy Practices
This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review this notice carefully. This practice is required by law to
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in
1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies
The smartphone revolution
Mobile Applications Security Eugene Schultz, Ph.D., CISSP, CISM, GSLC Chief Technology Officer Emagined Security [email protected] ISSA-Los Angeles Los Angeles, California January 19, 2011 Emagined
OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3
Chapter 12 - Software. Unit 1 Role and function of application software
Chapter 12 - Software Unit 1 Role and function of application software Contents Revise software concepts Role of application software Multimedia software Communication software Application software Definition:
Introduction. Special Conference. The Exploitation Of Media By Terrorist Groups
Forum: Issue: Student Officer: Position: Special Conference The Exploitation Of Media By Terrorist Groups Deniz Gokce Co-Chair Introduction Terrorist groups have been using social media to reach a wider
ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF. Cheryl Granto Information Security Manager, UFIT Information Security
ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF Susan Blair Chief Privacy Officer Cheryl Granto Information Security Manager, UFIT Information Security RULES OF THE ROAD Information Highway Danger Zones
