• Man who invented P@$$w0rd guidelines regrets it

      Anyone who has held a job that required a computer in the past decade and a half has been subjected to the tedious practice of having to change their password every 30 to 90 days. Then that password has to have an uppercase letter, a number, a symbol, an Egyptian hieroglyph, some ancient Sanskrit, your DNA sequence and that unpronounceable icon Prince used to use as his name.

      Greg's Corner- 19 readers -
    • Twitter Is a Vulnerable Attack Vector: Protect Yourself and Your Customers

      At this point, you are using social media not only for marketing purposes but also to speak to your customers. But when your customers speak to you are they following proper security measures, or are they using social media inappropriately? And if they are, what are you going to do about it? Furthermore, what are you going to do to prepare your employees for using social medi ...

      Growmapin Social- 8 readers -
  • Moving your website to HTTPS / SSL: tips & tricks

    … lines to the file, check that the configuration is still valid by running service nginx configtest. If so, reload Nginx by running service nginx reload. Become a technical SEO expert with our Technical SEO 1 training! » $ 199€ 199 - Buy now » Info Strict Transport Security header The Strict Transport Security Header (HSTS) is another handy feature…

    Yoast- 16 readers -
  • GoDaddy launches security service after Securi acquisition

    … GoDaddy has revealed the first fruits of its March acquisition of web security service provider Securi. It’s GoDaddy Website Security, what appears to be a budget version of the services Securi already offers on a standalone basis. For $6.99 per month, the service monitors your web site for malware and removes it upon request. It also keeps…

    Kevin Murphy/ DomainIncite- 16 readers -
  • CIRA and Nominum offering DNS firewall

    … Canadian ccTLD registry CIRA has started offering DNS-based security services to Canadian companies. The company has partnered with DNS security services provider Nominum to develop DNS Firewall, which it said lets customers “block access to malicious content before it can reach their network”. It’s basically a recursive DNS service…

    Kevin Murphy/ DomainIncite- 15 readers -
  • 6 Ways to Make Your Website Disaster Proof

    …, retaining visitor interest. A CDN can help with your website security and stability by acting as a firewall between your site and your traffic. Most CDNs offer some degree of traffic filtering and provide a first line of protection for your site. One affordable CDN solution is Cloudflare, which is connected to over 6 million websites to date. 3…

    Growmap- 18 readers -
  • How to Increase Security at Your Company

    … It’s a fear every business owner has: a breach in security. Whenever you have something valuable, you risk losing it. Photo by Rob Sarmiento Whether it’s a break-in, a data hack, or employee theft, such threats cause businesses to lose time and money. More than that, these breaches can hurt customers and severely damage a company’s reputation…

    Growmapin How To's- 23 readers -
  • Hacker hostage crisis at ICANN secret key ceremony! (on TV)

    … One of ICANN’s Seven Secret Key-Holders To The Internet got taken out as part of an elaborate heist or something on American TV this week. In tense scenes, a couple of secret agents or something with guns were forced to break into one of ICANN’s quarterly root zone key signing ceremonies to prevent a hacker or terrorist or something from…

    Kevin Murphy/ DomainIncite- 21 readers -
  • Cloud connected child’s toy leads to personal data breach

    … Cloud connected child’s toy leads to personal data breach As seen on TV toy CloudPets is actually a pretty clever concept. By using a smart phone app a traveling parent or a relative that lives far away can leave a voice message to a child on one of the stuffed animals. Except there’s that one inherent problem that affects any device connected…

    Greg's Corner- 16 readers -
Get the top posts daily into your mailbox!
See more
Acquisition Authenticity Big Data Brand Brand Differentiation Brand Humanization Brand Humanization Top Posts Business Planning Ceo Tips Chat Cmo Community Building Conference Content Content Marketing Content Marketing Top Posts Customer Service Domain Registrars Domain Registries E Commerce Earned Media Ecommerce Ecommerce And Retail Entrepreneur Small Business Etiquette Event Marketing Facebook Facebook Advertising Facebook Live Godaddy How To Https Influence Influence Marketing Top Posts Inspiration Age Instagram Instagram Stories Leadership Linkedin Malware Marketing 101 Marketing Infographics Mindset Mobile Commerce Mobile Marketing New Media Trends Owned Media Paid Media Pam Moore Participation Age Periscope Personal Branding Phishing Planning Popular Public Relations Random Acts Of Marketing Relationships Reputation Management Return On Relationship Reviews Risk Management Roi Sales Schema Semantic Search Seo Small Business Social Media Small Business Tips Smo Snapchat Social Brand Strategy Social Brand Top Posts Social Business Social Business Fitness Social Business Strategy Social Business Top Posts Social Community Development Top Posts Social Employee Social Listening Social Media Social Media Agency Social Media Agency Tips Social Media Engagement Social Media For Sales Teams Social Media Measurement Top Posts Social Media Networking Smm Social Media Planning Social Media Strategist Social Media Tips Social Selling Social Zoom Factor Podcast Technical Seo Time Management Tips Twitter Twitter Tips Video Visual Marketing Website Optimization
More from around the web