Avira Scout: Cookie Overkill

Many companies make money spying on you while you surf the internet. Sometimes they even sell the data they collect on you to other companies, without you knowing what got collected or who will get your data. To do so they have normal web pages integrate their tracking cookies – which is by the way the reason why cookies have a bad reputation.

The post Avira Scout: Cookie Overkill appeared first on Avira Blog.

Life beyond the screen: Coming face to face with technology addiction

Photo via Telegraph online

Photo via Telegraph online

Believe it or not, there’s more to life than what’s happening online! In its beginnings, technology was intended to make our lives simpler and more convenient. When technology becomes an addiction, however, it can become dangerous to our mental and physical health, not to mention our personal lives.

Avast is a technology and security company. At the same time, we’re also human beings. By sharing cybersecurity news on our blog, alongside our forum and social networks, we aim to make things simpler for our users — providing them with safety tips to avoid headaches and losses of time. In other words, we’d like everyone to reserve as much time as possible for the parts of life that truly matter.

Recently, a study found that students’ performance can significantly decline due to technology addiction. To fight students’ urge to be active on their devices when they shouldn’t be, there are several apps that have been created that close and prevent other apps to be opened, ensuring users to be able to stay focused and concentrated on their classes, research or homework.

Since it has become this difficult to pry ourselves away from our screens, it’s sometimes a good thing to occasionally be left without battery or network coverage. This way, we’re essentially forced to put off our thoughts about what’s being published on social media and focus on the things that are taking place around us.

Here in Brazil, it’s not uncommon to see signs at bars or restaurants that read something similar to “we don’t have Wi-Fi, talk among yourselves” or “we don’t have Wi-Fi, bring a friend to talk to”. These places don’t do this because they need to save money on their Internet bill — instead, it’s about providing their guests with human interactions and a genuine experience.

It’s our job to use our current technology wisely. When it’s time to concentrate and focus, Avast is there to keep our users safe from spam, scams, and hackers — things that cause us to lose time and energy.

You can depend on us to keep your security (and peace of mind) in tact. We urge our users to recommend Avast to the ones who they love and who they want to spend quality time with.


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

The main information security certifications for businesses

security certifications

Just being aware of all the headlines is enough to realize that new threats and vulnerabilities in the field of information security are constantly emerging. As a result, it is essential for a company to be able to rely as much on the preparation of their security professionals as it is their IT governance strategy.

That means there is just one question – what is the best way for both professionals to obtain the adequate training (which makes them more employable), and for businesses to do the same with protocols and security procedures (demonstrating a sense of security to their customers)?

The correct solutions would be the security certifications which allow for a combinations of minimal requirements, a standardized language, and a common, professional code of ethics.

If we as both professionals and leaders within an organization decide to take up a course in IT security management, it is recommended that we opt for certifications given by international and independent organizations.

With this in mind, here are some of the most relevant certifications available:

CISA / CISM

CISA and CISM are the two main accreditations issued by ISACA (Information Systems Audit and Control Association), an international association that has been sponsoring certificates and methodologies since 1967, and is currently made up of more than 95,000 members.

CISA (Certified Information Systems Manager) is newer than CISA, and offers accreditation in the knowledge and experience of IT security management.

What defines CISM are the basic standards of competence and professional development that an IT security director should possess in order to lead or design an IT security program.

CISSP

The Certified Information Systems Security Professional (CISSP) awarded by the ISC is one of the most valued certificates in the sector. Organizations such as the NSA or the United States Department of Defense use it as a reference.

The certificate is also known as being “a mile wide and an inch deep”—indicating the wide breadth of knowledge (a mile wide) that the exam covers and that many questions don’t go into nitty-gritty details of the concepts (only an inch deep).

COBIT

COBIT 5 (the latest version tested) is defined as being a reference point used by governments and for IT management in businesses. It is managed by the ISACA in conjunction with the IT Governance Institute.

COBIT is deigned to adapt itself to businesses of all sizes (including SMEs), different business models, and corporate cultures. Its standards are applied to fields such as information security, risk management, or decision making regards cloud computing.

ITIL

ITIL (IT Infrastructure Library) can be described as a reference of good practice and recommendations for the administration of IT services, with a focus on the administration of processes. The entity that manages this certificate is the OGC (Office of Government Commerce) in the UK.

While COBITS works on the management and standardization of the organization, ITIL centers itself on the processes – COBIT defines the what, and ITIL the how.

ISO / ISEC 27000

The standard that is published by the ISO (International Organization for Standardization) and by the IEC (International Electro-technical Commission) to act as a reference point for a group of standards that provide a framework of IT security management to be used by any type of organization (be they non-profit, public or private, big or small).

As opposed to the other certificates which are aimed at individuals, this one is directed more towards businesses.

The post The main information security certifications for businesses appeared first on MediaCenter Panda Security.