<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Archives - CIATEC</title>
	<atom:link href="https://www.ciatec.com/tag/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/tag/privacy/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Sat, 21 Dec 2019 12:34:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>Privacy Archives - CIATEC</title>
	<link>https://www.ciatec.com/tag/privacy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mobile Device Security</title>
		<link>https://www.ciatec.com/2019/12/mobile-device-security/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 21 Dec 2019 11:33:25 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Mobile Device Security]]></category>
		<category><![CDATA[Mobile Device Security Tips]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=3277</guid>

					<description><![CDATA[<p>Mobile Device Security Importance of mobile device security &#8211; In the today&#8217;s world, it is very unusual to find anyone who doesn’t own some kind of mobile device. Mobile phones or tablets are manufactured by numerous number of companies and there are many different service providers that equip the majority of world’s population with mobile &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/12/mobile-device-security/">Mobile Device Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Mobile Device Security<span style="color: #31aaa2;"><br />
</span></h2>
<p><strong>Importance of mobile device security &#8211;</strong> In the today&#8217;s world, it is very unusual to find anyone who doesn’t own some kind of mobile device. Mobile phones or tablets are manufactured by numerous number of companies and there are many different service providers that equip the majority of world’s population with mobile devices.</p>
<p>It is estimated that the number of mobile phone users by 2019 will surpass five billion people around the globe. In addition to the social and economical effects of this massive increase, there is a definite increase in the number of cyber crimes. Cyber criminals have taken advantage of this massive growth and developed methods to take advantage of the increased number of possible targets.</p>
<p>There are many opportunities for cyber-criminals to access their targets: through apps, operating systems and software, and by identifying and taking advantages of defects in security before the programmers do and a patch a released.</p>
<h2><span style="color: #31aaa2;">Threats to Mobile Device Security</span></h2>
<p>An outdated view of hacking, malware or viruses would limit this activity to desktop computers or laptops. The reality is that mobiles are just as <strong>at risk</strong>. In fact, reported incidents are in the range of 16 million attacks. A mobile device can be at risk from several different methods, some of which include:</p>
<h3><span style="color: #31aaa2;"><strong>Malicious, or Insecure Apps</strong> </span></h3>
<p>Malicious or insecure apps contain cyber security flaws in data storage, communication, or authentication practices, meaning they contain at least one common security vulnerability that can be exploited.</p>
<h3><span style="color: #31aaa2;"><strong>Data Sniffing</strong></span></h3>
<p>Data sniffing by capturing, monitoring and scanning traffic moving across a network. Active sniffingwill monitor traffic and it can also alter it in some way to the like of the attacking party.</p>
<h3><span style="color: #31aaa2;"><strong>Fake WiFi Networks</strong> </span></h3>
<p>Fake WiFi networks poses as a legitimate wireless service provider to intercept information that users transmit.</p>
<h3><span style="color: #31aaa2;"><strong>Vulnerabilities</strong></span></h3>
<p>Vulnerabilities within operating systems can be used to gain control of mobile devices, and depending on the operating system and its software, some mobile devices can be easily patched. However, others may be more difficult to patch, which could leave them vulnerable.</p>
<h3><span style="color: #31aaa2;"><strong>Inactive Apps</strong></span></h3>
<p>Inactive apps that are installed on mobile devices but unused and have unsecured access to personal and corporate information pose a significant danger to devices if they are not uninstalled properly.</p>
<p>In addition to the above threats, mobile devices are also susceptible to physical attacks due to their portability.</p>
<p>But all is not lost. Here are some practical steps that will help you minimize the exposure of your mobile device to digital and physical threats.</p>
<h2>Mobile Device Security Tips</h2>
<p>&nbsp;</p>
<figure id="attachment_6250" aria-describedby="caption-attachment-6250" style="width: 1585px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-6250 size-full" src="https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips.jpg" alt="Mobile Device Security tips" width="1585" height="1585" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips.jpg 1585w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-150x150.jpg 150w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-300x300.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-768x768.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-1024x1024.jpg 1024w" sizes="(max-width: 1585px) 100vw, 1585px" /><figcaption id="caption-attachment-6250" class="wp-caption-text">Mobile Device Security tips</figcaption></figure>
<h3><span style="color: #31aaa2;"><b>Use strong passwords and/or Bio-metrics</b></span></h3>
<p>Passwords are always important, but even more so when you consider that the device could be stolen and in the possession of someone who has unlimited access and time to try various values.</p>
<h3><span style="color: #31aaa2;"><strong>Screen Lock</strong></span></h3>
<p>The display should be configured to time out after a short period of inactivity and the screen locked with a password.</p>
<h3><span style="color: #31aaa2;"><strong>Remote Wipe/Sanitation</strong></span></h3>
<p>Many programs, such as <strong>Find my iPhone</strong> or <strong>Google Play Protect</strong>, even Microsoft Exchange Server (if an exchange email is configured on mobile device) allow you to send a command to the mobile device that will remotely clear the data on that device.</p>
<h3><span style="color: #31aaa2;"><strong>Physical Security</strong></span></h3>
<p>Mobile devices, such as tablets, mobile phones, and smartphones, must be properly stored and secured in a cabinet or safe when not in use.</p>
<h3><span style="color: #31aaa2;"><strong>Utilize VPN</strong></span></h3>
<p>Enforce the use of virtual private network (VPN) connections with a strong protocol like IPSec between the mobile device and enterprise servers, especially if connecting to an insecure open wireless network.</p>
<h3><span style="color: #31aaa2;"><strong>Encrypt your device</strong></span></h3>
<p>Data should be encrypted on the device so that if it does fall into the wrong hands, it cannot be accessed in a usable form without the correct passwords.</p>
<h3><span style="color: #31aaa2;"><strong>Disable Unused Features</strong></span></h3>
<p>Every feature has the potential to be another point of vulnerability in a mobile system, so it&#8217;s good practice to disable any features that don&#8217;t serve a purpose in your organization.</p>
<h3><span style="color: #31aaa2;"><strong>Install an Antivirus Application</strong></span></h3>
<p>A mobile antivirus solution will protect devices against malicious code (such as xCodeGhost and iBackDoor) embedded in apps. Here is a quick list of the most popular mobile antivirus application:</p>
<ul>
<li>Kaspersky lab (<a href="https://itunes.apple.com/sa/app/kaspersky-safe-browser/id723879672?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.kms.free" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>McAfee (<a href="https://itunes.apple.com/gb/app/mobile-security-wifi-scan/id724596345?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.wsandroid.suite" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>ESET (<a href="https://play.google.com/store/apps/details?id=com.eset.ems2.gp" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>AVAST (<a href="https://itunes.apple.com/us/app/avast-security-photo-vault/id1276551855?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
</ul>
<h3><span style="color: #31aaa2;"><strong> Disable Wi-Fi and Bluetooth When Not Needed</strong></span></h3>
<p>Disable Wi-Fi and the discovery setting on Bluetooth connections to prevent bluejacking and bluesnarfing attacks and avoid connecting to an insecure open wireless network.</p>
<h3><span style="color: #31aaa2;"><strong>Software Updates</strong></span></h3>
<p>Keep the mobile operating system and its apps up to date. Everything from the mobile operating system to the games and miscellaneous apps are potential gateways for hackers to compromise the mobile device. Updating mobile devices and apps on a regular basis ensures the best protection against most mobile security threats.</p>
<h2>Other mobile device security tips</h2>
<h3><span style="color: #31aaa2;"><strong>Perform Regular Mobile Device Security Audits</strong></span></h3>
<p>At least once a year, conducting mobile security audit helps companies keep their compliance programs up to date, effective and aimed in the right direction.</p>
<h3><span style="color: #31aaa2;"><strong>Perform User Education</strong></span></h3>
<p>Implement a continuous information security awareness and training program that teaches employees about mobile device threats and enterprise mobile device management and security policies.</p>
<h2><span style="color: #333333;"><strong>The Bottom Line in mobile device security<br />
</strong></span></h2>
<p>Mobile device security should be a primary concern. It isn’t simple to accomplish, and new attacks occur every day through new vulnerabilities. You need to always be aware of and notice anything unusual that happens on your device.</p>
<p>We hope that the tips mentioned in these article will help to enhance your mobile device security. If you like this article please subscribe to our newsletter and share with your friends.</p>
<p>Also check out how can you raise awareness among employees enhanced mobile devices usage and various other information security domain <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/12/mobile-device-security/">Mobile Device Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is SSL Certificate?</title>
		<link>https://www.ciatec.com/2019/07/what-is-ssl-certificate/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 23 Jul 2019 16:38:17 +0000</pubDate>
				<category><![CDATA[Digital Strategy]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL Certificate]]></category>
		<category><![CDATA[Website Security]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6343</guid>

					<description><![CDATA[<p>What is SSL Certificate? SSL certificate stands for Secure Socket Layer, and it is used to create an encrypted connection between website visitors devices (clients) and the server hosting the website. In a nutshell, an SSL certificate is used to secure personal information that is being entered into a website such as usernames, passwords, address &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/07/what-is-ssl-certificate/">What is SSL Certificate?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>What is SSL Certificate?</h2>
<p>SSL certificate stands for Secure Socket Layer, and it is used to create an encrypted connection between website visitors devices (clients) and the server hosting the website.</p>
<p>In a nutshell, an SSL certificate is used to secure personal information that is being entered into a website such as usernames, passwords, address and credit card information.</p>
<p><img decoding="async" class="alignnone size-full wp-image-6349" src="https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate.png" alt="Ciatec SSL Certificate" width="403" height="200" srcset="https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate.png 403w, https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate-300x149.png 300w" sizes="(max-width: 403px) 100vw, 403px" /></p>
<h2>SSL Certificate components</h2>
<p>The certificate is composed of the following components:</p>
<ul>
<li>Digital signature of the issuing authority or the verifier</li>
<li>The certificate key or serial</li>
<li>Certificate expiry date</li>
<li>Certificate owner</li>
</ul>
<h2>Do you need SSL certificate for your website?</h2>
<p>If your website collects any sort of user information it will require an SSL certificate to keep the transfer of this information to-and-from the web server secure. Moreover, <a href="https://www.blog.google/products/chrome/milestone-chrome-security-marking-http-not-secure/" target="_blank" rel="noopener noreferrer">google chrome started in July, 2018</a> marking website without SSL certificate as “Not Secure”. So if you care about your <a href="/seo" target="_blank" rel="noopener noreferrer">search engine ranking</a>, you definitely need to setup a certificate.</p>
<p>In the <a href="https://letsencrypt.org" target="_blank" rel="noopener noreferrer">Let’s Encrypt</a> era, where SSL certificates are given for free, the question is not whether you need a certificate for your website or not, because you most probably do. The question is whether you should go for a free or paid one.</p>
<h2>When should you start paying for your SSL Certificate?</h2>
<p>To answer this question first we need to look at the difference between free and paid certificates.</p>
<p><strong>Verification Level</strong><br />
Free certificates provides domain validation (DV) only, whereas paid versions provide organization validation (OV) and extended validation (EV), meaning that they provide validation for the site owner organization and not just the domain name.</p>
<p><strong>Duration</strong><br />
Free certificates usually have a validity period of three months while paid certificate can be renewed once every three years.</p>
<p><strong>Support and Warranty</strong><br />
All paid certificate comes with backend warranty several support packages to purchase and tech support are only a chat window or email message away. Obviously, free SSL comes with no warranties and if something goes wrong on the verifier’s side, you’re on your own.</p>
<p>So both choices provide a website with the famous green https lock. But the bottom line is that free certificates are great for a blog or an informative website that does not have much more than a simple contact form and a newsletter subscription. However, if trust a major issue for online business- and in most cases it is- especially in e-commerce websites, then paid certificate is the only option.</p>
<h2>Where to buy?</h2>
<p>When it comes to paid service providers there are many choices, where budget and service levels are the most deciding factors. To name a few service providers:</p>
<ul>
<li>DigiCert &#8211; <a href="https://www.digicert.com/" target="_blank" rel="noopener noreferrer">digicert.com</a></li>
<li>Symantec websecurity &#8211; acquired by Digicert in 2017</li>
<li>VeriSign &#8211; <a href="https://www.verisign.com/">verisign.com</a> acquired by Symantec in 2010</li>
<li>Sectigo &#8211; Formerly Comodo &#8211; <a href="https://sectigo.com" target="_blank" rel="noopener noreferrer">sectigo.com</a></li>
<li>GoDaddy &#8211; <a href="https://www.godaddy.com/web-security/ssl-certificate" target="_blank" rel="noopener noreferrer">godaddy.com</a></li>
<li>Network Solutions &#8211; <a href="https://www.networksolutions.com/SSL-certificates/index.jsp" target="_blank" rel="noopener noreferrer">networksolutions.com</a></li>
<li>Cheap SSL Security &#8211; <a href="https://cheapsslsecurity.com/" target="_blank" rel="noopener noreferrer">cheapsslsecurity.com</a></li>
<li>RapidSSL &#8211; <a href="https://www.rapidsslonline.com/ssl-brands/rapidssl/rapidssl-certificates.aspx" target="_blank" rel="noopener noreferrer">rapidsslonline.com</a></li>
</ul>
<h2>Need help?</h2>
<p>Hope that this article was helpful, if you require any help with setting up <strong>SSL certificate</strong> for your website let us know <a href="/contact">here</a>. We&#8217;ll be more than happy to help.</p>
<p>The post <a href="https://www.ciatec.com/2019/07/what-is-ssl-certificate/">What is SSL Certificate?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</title>
		<link>https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 30 Jan 2019 10:33:23 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[Awareness]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=5687</guid>

					<description><![CDATA[<p>UPDATE: Apple marked Group Facetime as &#8220;temporarily unavailable.&#8221; If you are reading this on an iPhone, you might want to stop reading and immediately go into your settings and disable Facetime. Apple confirmed an unpatched bug in group Facetime app that allows a caller to see and listen to you without even picking up the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/">[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>UPDATE: Apple marked Group Facetime as &#8220;temporarily unavailable.&#8221;</strong></p>
<p>If you are reading this on an iPhone, you might want to stop reading and immediately go into your settings and disable Facetime.</p>
<p>Apple confirmed an unpatched bug in group Facetime app that allows a caller to see and listen to you without even picking up the phone!</p>
<p>The bug was reported in January 21st by <a href="https://twitter.com/MGT7500" target="_blank" rel="noopener">@MFT7500</a></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">My teen found a major security flaw in Apple’s new iOS. He can listen in to your iPhone/iPad without your approval. I have video. Submitted bug report to <a href="https://twitter.com/AppleSupport?ref_src=twsrc%5Etfw">@AppleSupport</a>&#8230;waiting to hear back to provide details. Scary stuff! <a href="https://twitter.com/hashtag/apple?src=hash&amp;ref_src=twsrc%5Etfw">#apple</a> <a href="https://twitter.com/hashtag/bugreport?src=hash&amp;ref_src=twsrc%5Etfw">#bugreport</a> <a href="https://twitter.com/FoxNews?ref_src=twsrc%5Etfw">@foxnews</a></p>
<p>&mdash; MGT7 (@MGT7500) <a href="https://twitter.com/MGT7500/status/1087171594756083713?ref_src=twsrc%5Etfw">January 21, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>It is worth mentioning that this major privacy issue was reported days before the world celebrated <a href="https://twitter.com/hashtag/dataprivacyday" target="_blank" rel="noopener">#DataPrivacyDay</a> on January 28th.</p>
<p>The post <a href="https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/">[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
