Author Archives: Admin

McAfee SECURE Certification Now Includes Identity Protection for Your Buyers


Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

Today, we’re excited to announce that McAfee SECURE Certification Pro sites can now give their buyers free Identity Protection. Now you can address one of the top concerns of internet users by adding another layer of protection to your McAfee SECURE service.

Give your customers another reason to buy.

Because internet users are so worried about online security (almost 9 in 10, according to a 2013 survey), any indications that you’re making their security a priority is going to sit well with them. You already have McAfee SECURE certification, which eases their concerns before they buy. And now with Identity Protection, you’re able to:

  • Make customers feel safe after they buy as well
  • Show customers you care about their security
  • Boost conversions by turning on-the-fence shoppers into buyers
  • Build customer loyalty by giving them free identity theft insurance

And from a consumer perspective, Identity Protection is completely free. That’s right. Just because they bought from your site, they’re protected for up to $100,000. All they have to do to get it is take 2 minutes to activate the service. What’s a consumer not to like about buying from you?

So what exactly is Identity Protection?

Identity Protection is a type of insurance that, in the unfortunate but all-too-common event of identity theft, helps your customers cover the costs associated with getting their lives back. Once they enable the service, they’re protected forever.

Why is this a valuable service?

Because even if your site already has security features like an SSL certificate and McAfee SECURE certification, identity theft can still happen. Consumers know this, and want to be protected from this worst-case scenario.

Some facts about the cost of identity theft, from the Department of Justice, might be useful here:

  • More than 17 million Americans suffered identity theft in 2014
  • 14% of victims reported an out-of-pocket loss (i.e. the cost wasn’t covered)
  • Of those reporting a loss, roughly half lost more than $100, and 14% lost more than $1,000.

Here is what is covered by Identity Protection (it’s a lot).

  • Any legal costs for up to $100,000
  • Up to $5,000 for any fraudulent withdrawals from bank accounts
  • Up to $3,000 dollars for child and elderly care, plus up to $3,000 in any loss of income
  • Up to $1,000 for any traveling expenses, and up to $1,000 for replacing documents

Here’s what you need to do

Giving Identity Protection to your customers is super easy. All you need to do is add an extra line of code to your site’s purchase confirmation page. This code allows us to send them an email containing the insurance certificate they need to file a claim. The code looks like this:


You’ll also want to add a single line of code that will add an engagement kicker. The kicker will let visitors know that if they buy from you, their identities will be protected. That’s why it’s a good idea to put it anywhere you want more conversions — like product pages, in the shopping cart, and near credit card forms. The kicker will look like this:


The line of code that lets you add the kicker is simple. It looks like this:


Your verification page will also reflect the change:


Once you’ve installed the code snippets, you’re done! After a customer makes a purchase on your site, they will now receive an email from you informing them of their coverage, and they’ll feel more confident making future purchases, making you more money.

Source : : Blog

How McAfee is Adapting to the Mobile Landscape with New Partnerships and Innovation

How McAfee is Adapting to the Mobile Landscape with New Partnerships and Innovation

 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

Mobile World Congress (MWC) 2018 is finally upon us, and mobile and security providers from around the world are in Barcelona presenting the latest and greatest insight and innovation. At this year’s MWC, McAfee is excited to present our own unique insights and innovations, some of which are supported by our partners. These include: McAfee Secure Home Platform Skill for Amazon Alexa, the 2018 McAfee Mobile Threat Report, and our industry partnerships with Samsung, Telefónica, Türk Telekom, NTT DOCOMO.

Adapting to Alexa

As we know, the growing type and number of connected devices has changed the way security operates – which is why our team created McAfee Secure Home Platform in the first place. But now, we’re excited to announce the planned launch of the new McAfee Secure Home Platform skill for Amazon Alexa, one of the most popular connected devices out there today. Customers with a McAfee Secure Home Platform enabled router can easily manage their connected home’s network security using their voice. And it’s already gaining traction with MWC attendees, as McAfee just won “Best of MWC 2018” from PC Mag for the Alexa skill!

Insight on the changing mobile landscape

Your phone is not just a phone. It is a rich computing environment that contains the keys to your connected life. And as the 2018 McAfee Mobile Threat Report reveals, cybercriminals know that, and are tailoring their strategy to our dependency on our mobile devices. The report aims to provide insight on the explosion of mobile malware and dramatic changes to the mobile landscape. The report also tells us that there have been over 16 million infestations detected in the third quarter of 2017 alone – nearly double the number from last year.

Partnerships that strengthen our customers’ security

The ever-changing mobile landscape is precisely why we’re working with our partners to find new ways to secure our customers’ mobile devices and digital lives. McAfee is today announcing key partnerships to ensure security is built-in across devices and networks. It’s more important than ever that the entire ecosystem works together to protect consumers around the world from these attacks and deliver them peace of mind. So, how exactly are we doing this? For starters, our partnership with Samsung has expanded to safeguard all Galaxy S9 smartphones, the Galaxy Note8, along with Samsung smart TVs, PCs and notebooks. We also announced a partnership with Telefónica, which will help protect Telefónica customers, and provide always on protection for every connected device in the home. We also announced a strategic partnership with Türk Telekom to deliver cross-device security protection. What’s more – NTT DOCOMO and McAfee now have an extended partnership in order to deliver Wi-Fi protection and security to NTT DOCOMO mobile users.

We’re excited to see what’s to come for the rest of MWC, and how these announcements will help improve our customers’ lives. With these new innovations, we hope our 400 million customers can live their digital lives with confidence and comfort.

Source : : Blog

10 Identity Protection Tips You Need To Know


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

Our lives and personal information are increasingly online. And though going digital saves time and trees, it can be risky. In fact, roughly 1 in 14 Americans become a victim of identity theft every year.

But there are steps you can take to make you less likely to be one of those unlucky 1 in 14. In this post, we’re going to go over 10 tips to protect your identity both online and off.

TIP #1 – Use HTTPS sites whenever possible

HTTPS sites offer you better protection, because any information you enter on them—like contact information, passwords, or credit card details—will be encrypted.

TIP #2 – Do not keep a password document

Many people have a document on their computers called “passwords.” This is dangerous, as it is easily accessible. A better, more secure solution is to use a web-based password management tool such as LastPass or 1Password.

TIP #3 – Protect your home computers

Simple, free software like antivirus and a firewall can ensure that your computers — and personal information — aren’t compromised by hackers.

TIP #4 – Get annual credit report

It never hurts to check up on your credit report once a year to make sure it doesn’t include suspicious accounts. It’s usually free, too!

TIP #5 – Guard your personal information

If you get unsolicited requests for personal information, or a random email asking you to click on a link, be on guard. Make sure you verify the identity of the person or company requesting it. It could be a scam.

TIP #6 – Monitor account activity daily

Be vigilant about checking your checking, savings and other financial accounts daily to catch fraud before it costs you.

TIP #7 – Protect your Social Security Number

Keep your card and any documents with your social security number on them in a safe place. Don’t carry them on your person, unless you have to.

TIP #8 – Use a strong password on your mobile devices

These days there are great apps to access your financial information and tax information on your mobile phone. Protect your mobile devices with a strong password.

TIP #9 – Beware of phishing scams

Phishing emails try and trick you into giving out your credit card, passwords, or social security number. Remember that trustworthy companies would ask you to log into your account before sending any personal information.

TIP #10 – Shred your documents

Identity thieves can find sensitive information in documents you throw away, such as bank statements and bills. You can protect yourself by shredding all your sensitive documents before dumping them in the trash.

Source : : Blog

The Need for Cybersecurity Products, and Companies, to Talk to Each Other


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

There are a considerable measure of cyberthreats out there. Also, some may take comfort that there are 1,300 cybersecurity programming firms fighting against them. That may appear like a great deal, however despite a large number of online perils, it’s a fight that is not generally won. A large portion of these cybersecurity associations are, truth be told, going up against the test in relative vacuums, each endeavoring to take care of similar issues in various ways. This basically makes isolate front lines, as opposed to working together in this mind-boggling digital war.

We know there is a need to lessen multifaceted nature, particularly given the battle to get enough IT security aptitude and headcount, and clients gripe it’s hard to get numerous items cooperating and keeping up those combinations. Truth be told, 67%1 of client respondents demonstrate that investigation and tasks ventures are being disabled in light of an excessive number of point arrangements, rather than utilizing an incorporated stage. So it’s vital to investigate how cybersecurity firms function, and cooperate.

This is the test that drove McAfee to make the “Information Exchange Layer” (DXL) in 2014. The thought is straightforward: organizations team up in a data/insight trade. The DXL correspondence texture interfaces and enhances security activities over different seller items, and also inside created and open-source arrangements. Undertakings increase secure, close constant access to new information and moment collaborations with different items.

Starting today, the DXL environment has in excess of twelve members, including Aruba, Check Point, Cisco, Huawei, Interset, SAS, and Titus. What’s more, in the previous a half year alone 24 organizations have started the procedure to join, including IBM Security, Juniper, and VM Ware.

Open DXL

The DXL idea got a major lift in 2016, when McAfee reported it would open the DXL source code to engineers (the “Open DXL” activity). OpenDXL helps engineers and undertakings unreservedly use DXL, giving the “keys to the kingdom” to 1,500 programming designers to date. That is an extra 1,500 programming engineers battling for everybody’s wellbeing.

The site is the point of convergence for the OpenDXL people group and enables engineers to envision, find, assemble, send, or talk about administrations for the DXL interchanges texture. The objective is to enable DXL combinations, give an index of accessible applications, and sustain new thoughts.

The OpenDXL activity has indicated expanding appropriation, with 57 group constructed combinations on to date. Arrangements are supported through a product engineer unit (SDK), distributed to the GitHub source code vault and Through the OpenDXL activity, incorporation and coordination are currently reached out to open-source and venture applications.

Joining with Cisco

DXL keeps on advancing with a strong stage to arm for cybersecurity fighting. In late 2017 McAfee and Cisco started a joint incorporation amongst DXL and Cisco’s own informing texture, PxGrid, making the business’ biggest risk security coordination (100 accomplices) biological system.

Industry and venture pioneers have since quite a while ago called for more noteworthy perceivability and adequacy in security tasks. Cisco pxGrid and DXL interoperability stamp the first run through this has been accomplished at such scale. Together this joint framework gives clients perceivability and continuous security arrangement, sharing data between the system and the endpoint. Bi-directional information stream enhances coordinated applications with nitty gritty data, permitting investigators perceivability into basic information, for example, what is on their system, current security act, benefit levels, and that’s only the tip of the iceberg. With the two textures interoperating, associations would now be able to drive mixes with security arrangements from many merchants.

McAfee groups additionally contributed a few new ventures to, including a Docker-based advancement condition that gets individuals up and running in five minutes. Organizations, for example, MGM and AT&T have grasped the idea. Today DXL has more than 3,000 clients and seven million introduced customers with mechanized procedures that can cross already siloed devices. This enables clients to proficiently and viably oversee dangers by connecting endpoint, system and security task spaces to close security holes.

The Future

It may not shock individuals that there is a deficiency of designers in the cybersecurity business. What’s more, as the advanced world develops into new fields like counterfeit consciousness, and the Internet of Things puts cybersecurity unequivocally into our homes, the dangers will likewise develop. We should cooperate as an industry.

This is only the start of an essential development. We are at an intersection. We have to challenge our own convictions.

We should enable security groups to quit investing their energy in monotonous mixes and manual undertakings, and rather center around shielding against enemies. Associations should hope to boost the estimation of their condition with arrangements that incorporate. Layering new innovations that don’t address each other just makes holes that enemies can abuse. Coordinated effort all through the security business is basic to shutting data holes, breaking storehouses and giving the perceivability we have to shield our most essential resources from cybercriminals.

To put it plainly, we have to converse with each other. Also, the devices we create need to converse with each other, and cooperate.

Source : : Blog

New McAfee Report Reveals Identity Theft is the Most Expensive Form of Property Crime


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

Between Uber, Equifax, and a modest bunch of others, the U.S. has seen real information breaks in the previous year that have traded off the individual data of millions, abandoning them to manage the likelihood of wholesale fraud. What’s more, the effect isn’t lost on buyers, as indicated by a current McAfee review, 61% of buyers say their worry in regards to online security has expanded in the course of recent years. In this way, to track the impacts and monetary effect of these assaults, the Center for Strategic and International Studies (CSIS) and McAfee discharged another report, The Economic Impact of Cybercrime, which found that wholesale fraud is the most costly sort of property wrongdoing in the U.S.

All in all, exactly what amount of cash have these breaks fetched ordinary buyers? Data fraud particularly has taken a toll people $10 billion more than the loses credited to all other property wrongdoing. You heard effectively: billion. The report additionally discloses to us that since 2014, about three billion web accreditations and other by and by identifiable data (PII) have been stolen by programmers, and 66% of individuals on the web (in excess of two billion people) have had their own data stolen or traded off. Indeed, cybercrime positions third in dollar esteem among unlawful exercises internationally, simply behind government debasement and opiates trafficking.

Presently the following inquiry is – what’s being done to secure against this? For the most part, those bargained by these assaults check their bank articulations, agree to accept observing, and hack up their Visas. However, past that – very little. Despite the fact that shoppers are worried about their own security, just 37% of people utilize a data fraud insurance arrangement, and 28% have no plans to agree to accept an ID robbery assurance arrangement, which means there is still more that should be possible. Consequently, to guarantee your own personality remains ensured, take after these tips:

Be cautious about what you share. Agreeing to accept new administrations more often than not expects you to give individual data. Yet, before giving that data away, it’s basic to think about the cost of doing as such and decide whether the administration got is justified regardless of the cost sharing that information.

Check your protection settings. This is a simple one. You ought to modify your settings to just share information when required, or just with individuals you know and trust.

Use a data fraud arrangement. With this individual information drifting around on the web, it’s critical to remain mindful of any endeavors to take your character. Utilize a data fraud arrangement, for example, McAfee Identity Theft Protection, that can help shield actually identifiable data from wholesale fraud and extortion.

Source : : Blog

McAfee Employees Share How They Press For Progress on International Women’s Day

McAfee_Employees_Women’s Day

 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

During the month of March, we’re excited to support International Women’s Day (March 8) and Women’s History Month. At McAfee, we recognize the power of an inclusive and diverse culture and are proud to celebrate the achievements of our trailblazing female colleagues worldwide. And of course, no group is more passionate about doing so than our Women in Security (WISE) Community.

WISE is a global network committed to supporting the growth, empowerment, and success of women at McAfee. As part of this year’s International Women’s Day call to action, our WISE community are leading by example and sharing their own #PressForProgress moments to help inspire and encourage others in their careers.

See some of the examples below and submit your own #PressForProgress moments in the comment box below!

#PressForProgress at McAfee

Lisa Depew – Industry and Academic Outreach (US)

“Having spent 20 years in engineering design, validation, operations, and customer enabling, I am passionate about how technology can help transform lives. I #PressForProgress by engaging industry, government, and academia on how to bring new talent, especially young girls, to careers in STEM.”



Arati Sankhe – Director, Software Engineering (India)

“I #PressForProgress by remaining flexible in my career and challenging myself to look for the next opportunity to grow. In my 13 years at McAfee, I started as a software developer, moved to customer support, and then relocated from Waterloo, Canada to Bangalore to take on a new leadership opportunity.”



Rachel O’Brien – Staffing Manager (Ireland)

“Each day, I have the unique opportunity to #PressForProgress through the Cork GROW program, where I teach the techniques I learned from Personal Management Coaching courses I attended at UCC. I’ve also had the privilege to bring Ted-style talks to the WISE Cork group, enabling thought and diversity leaders to share their personal stories of challenges and successes with their coworkers.”


Silvana Ghigo – Administrative Support (Argentina)

“I #PressForProgress by leading community service and university/school events for the Cordoba office. Last year, through the efforts of our employees, we gave online safety talks to over 300 primary and high school students, donated 400 presents to kids, and volunteered over 300 hours of work on global community service day.”


Darlene Connelly – Software Sales Engineer (US)

“Since joining McAfee in 2016, I’ve been fortunate enough to share my experience as an Enterprise Technology Specialist with our customers. Each day, I get to #PressForProgress and add value to our customers through my health check findings.”



Tiffanie Williams – Director, Market Research (US)

“At McAfee, I’m continuously presented opportunities that challenge my limits and set new boundaries.  I #PressForProgress by consciously laying the groundwork for my successor while preparing myself for the next growth opportunity that lays before me.”



Bernadette Mannix – Accounting (Ireland)

“I think it’s important to share our talents with and make ourselves available to people inside and outside of work. I #PressForProgress by speaking at the WISE Cork chapter, serving as secretary of the McAfee Toastmasters, and serving underprivileged people around the world.”



Rupa Roy – Sr. Manager, Marketing (India)

“I #PushForProgress by constantly challenging myself to take on new roles. Prior to my current role as a marketing leader, I worked in several positions and took on new opportunities to grow my career at McAfee.”




For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Source : : Blog

McAfee CEO Chris Young Talks About the Impact of Connected Devices in MWC 2018 Keynote


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

MWC 2018 came and went in the blink of an eye and new mobile innovations and exciting announcements emerged from vendors across the globe. Though we had our fair share of unique insights and innovations to share, we also had the pleasure of leading the conversation around the foundations of the digital economy, as McAfee CEO Chris Young was a keynote speaker on this topic.

The keynote dives into how the digital economy has been catalyzed by the rapid growth of mobile technologies in the hands of billions of people, and how these devices will continue to transform how we do business. Chris Young adds his unique security perspective on this phenomenon and explores how mobile applications have changed the way we live and secure our personal lives. He notes that the world is now at a precipice, and asks the important question – how can we secure a large-scale connected device ecosystem without stifling the growth and innovation of this ecosystem?

Find out his proposed answer and learn more about the state of the mobile security landscape by watching Chris’ keynote (his part starts around 33 minutes) here:

Source : : Blog

Key Mobile Threat Takeaways from the 2018 Mobile Threat Report


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

The term “mobile” has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable watches, tablets, even home devices all fall under the mobile umbrella of IoT and have the ability to impact our lives for better, or for worse.

This rich IoT landscape holds the key to your digital identity, your connected home and potentially, even your kid’s digital future. Gartner predicts that by the year 2020, 20.8 billion connected devices will populate the consumer home. (Current global population is 7.6 billion people.) As these devices continue to increase in presence in our daily lives, it’s important to understand not only the convenience they offer, but the threats they pose as well.

With the dawn of an even more connected era fast approaching, we at McAfee are examining the mobile threats that might be waiting on the horizon. This year’s Mobile Threat Report, takes a deep dive into some significant trends that demonstrate just how these mobile platforms are targeting what’s most sacred to us – our home. Let’s take a look into some of the most common trends in mobile malware, and a few tips on how to protect your home.

Mobile Malware in the IoT Home
According to Gartner, 8.4 billion connected “things” were in use last year, and chances are one or more of these devices is living in your home today. While many of these devices bring convenience and ease to the home, it’s important to note that they also significantly increase the risk of attack. Many of these devices are developed with innovation in mind, and little to no focus on – security. With that being said, everyday users of mobile devices have grown phenomenally, hence the increased need for security as the frequency of mobile attacks continues to grow.

DDoS Causes SOS
IoT attacks such as Mirai and Reaper showed the world just how vulnerable smart homes and connected devices can be to malicious code. These attacks targeted millions of IoT devices with the intent of creating a botnet army from trusted connected items within the household.

The Mirai malware authors, leveraged consumer devices such as IP cameras and home routers to create a botnet army, launching distributed denial of service (DDoS) attacks against popular websites. By taking advantage of the low-levels of security on most home connected devices, this malware was able to seize control of millions of devices. All it had to do was guess the factory default password.

The “Reaper” malware strain also took advantage of limited security of many connected home devices. However, these malware authors evolved their tactics by looking for devices with known vulnerabilities to exploit and by implementing a set of hacking tools that showed greater sophistication. The IoT reaper clocked in as many as 2 million infected devices, at nearly ten times the rate as Mirai.

The evolution of the malicious code targeting mobile and IoT devices represents a growing threat to consumers who wish to embrace a culture of connected living. So how can we welcome these devices into our homes without opening the door to cyberthreats? Here are a few tips to consider:

Protect your devices, protect your home. As we continue to embrace a culture of smart homes and connected devices, it is also important for us to embrace internet security at a network level. With the presence of targeted attacks growing globally, we must remain vigilant in protecting our connected lives by making sure each individual device is secure, especially the home network. The MTR has dubbed 2018 as “The Year of Mobile Malware,” and very tech user should consider using a home gateway with built-in security to ensure every device in their home is protected.

Download apps with caution and update them regularly. Malware campaigns having been targeting users on the Google Play stores almost since its inception. In fact, McAfee recently discovered Android Grabos, one of the most significant campaigns of this year, found present within 144 apps on Google Play. Stay current on which applications are supported in your application store and update them regularly. If an app is no longer supported in the play store, delete it immediately.

Invest in comprehensive security. I can’t stress enough how important is to use comprehensive security software to protect your personal devices. Malware is constantly evolving with technology, so ensure your all of your devices are secured with built-in protection.

Source : : Blog

6 Tips to Help Protect and Improve Your Child’s Online Reputation


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

That’s the short, efficient text message I’ve sent more times than I can count over the years while monitoring and coaching my kids’ online content choices.

My daughter is now a senior in high school with her eyes fixed on college. And while she can take credit for her strong grades and test scores, I will (unapologetically) take credit for influencing her digital reputation, which impacts everything from college applications to scholarships to career opportunities.

Looking back, it hasn’t been easy. There have been arguments. There have been tears. There have been consequences and days I despised the invention of the smartphone. There were other days I watched helplessly as other kids — kids I knew— made choices online that would have long-lasting consequences. Still, our family made it through (mostly) unscathed. Thankfully, my daughter is walking into the next phase of life with a solid understanding of how to shape and manage her online reputation. The best part: I trust her.

If you are frustrated, weary, or just fed up with the daily battle over your child’s online choices and trying to wrangle their daily digital activity, here’s a word of encouragement just for you. You can do this. Stay the course. Be consistent and persistent. Your efforts will be worth it as your kids earn their digital wings and fly without you one day.

6 Tips to Protect Your Child’s Online Reputation

Be a coach, not a critic

The most effective tool you have in your parenting arsenal is building a good relationship with your child. Build your relationship with your child before you throw down the rules. Approach monitoring your child’s digital life as a coach and not as a 24/7 critic. Take the time to understand your child’s favorite apps, their online friend groups, and what they love most about connecting and sharing with others online. Taking the time to understand your teen’s digital life will permit you to be a coach they will listen to (not just a parent throwing out random rules). The secret to connecting with teens? Listen attentively. Teens will talk to adults that they feel want to hear what they have to say.

Help them hone their “knower”

As adults, we have an inner “knower,” or a wise voice that knows the better choice. Kids, on the other hand, have a further to go before their knower, or their conscience takes over. Remember, as intelligent as your child may be, there’s still critical physiological (brain) and emotional (maturity) development taking place. In that process, help your kids to listen to that small inner voice that advises them against unwise choices such as using profanity online, sending racy photos, impulsive comments, or making a snap judgment. Most colleges and employers will think twice before considering a person who is disrespectful or irresponsible online.

Encourage discernment

Things once considered personal have found their way into the digital mainstream. Don’t assume your kids have the same understanding of modesty or privacy as you. Remember: They take more cues from their peers than you these days. Kids often vent and work out their problems through public posts, which can impact his or her online reputation. Things such as a family crisis, legal issues, or a relationship dispute should not be shared or worked through online. While it may feel right at the moment, over-sharing personal issues can lead to online shaming and deep wounds for a child if bullies and trolls are on the loose. When difficult circumstances arise, encourage your child to log off and talk face to face with you, friends, or a counselor. Online shaming and hate, as captured in the book, Shame Nation, has become an epidemic. Knowing how to avoid online hate begins with coaching kids on sound judgment.

Google it, and revise it

To get a clear picture of your child’s digital footprint and what a school or employer sees, Google your child’s name and piece together the picture yourself. Examine the social networks, links, and sites that have cataloged information about your child. One of the best ways to replace damaging digital information is by creating positive information that overshadows it. Encourage your child to set up a Facebook page that reflects their best self — their values, their goals, and their character. Make the page public so others can easily view it. They may also consider setting up a LinkedIn page that highlights specific achievements, specific goals, and online endorsements from teachings and employers.

Turn off tagging

Like it or not, we all get judged by the company we keep. This hard and fast rule also applies to kids the online world. Your child’s online behavior may get an A+, but reckless friends can sink that grade fast. To make sure your child doesn’t get tagged in risky photos on Twitter, Instagram, or Facebook, make sure privacy settings prevent tagging or require user approval. Also, encourage your kids to pay more attention to unflattering Snapchat photos and Snapchat story photos that other people post about them that can be problematic if shared elsewhere.

Get proactive & practical 

With a few safeguards in place, you can help protect your child’s reputation. 1) Privacy settings. By adjusting privacy settings to “friends only,” mistakes can be minimized. However, we know that anything uploaded can be shared and screen captured before it’s deleted so tightening privacy settings isn’t a guarantee. 2) Parental controls. Your kids may not like having filters on their phone or PC, but like eating vegetables, it’s what’s best for them. By using additional filtering, you could be closing off digital roads and relationships that could be harmful to your child’s reputation. Also, double-check that social settings are marked private.

Source : : Blog

What do cybersecurity and the board game Battleship have in common?


 Tags :- | | activate | McAfee com activate | activate McAfee | McAfee Activate | McAfee Retail Card.

A long day of encouraging a customer to reconsider their lack of desire to develop a plan, build a security architecture that included automation and orchestration –  with the ability to measure value vs. just adding tools as needed – led to a very late-night drive home. I was encouraged the customer invited me back to prove my case, but it was one of those days that left me shaking my head. In reflecting on the day and all the discussions, I kept thinking back to how many times both sides used the words “cybersecurity strategy.”

Clearly, strategy is one of those words that takes on different meaning depending on the context. A thought that came to mind on my drive home was that cybersecurity is very much like the board game Battleship. Both involve strategy, and operate in a “static model”.  In the game Battleship, as you may recall, the game play is simple: each player arranges five ships—an aircraft carrier, battleship, cruiser, submarine, and destroyer—on a ten-by-ten grid of squares and attempts to “sink” his opponent’s ships by calling out the squares where he believes his enemy’s ships are hiding. Most players approach the game as essentially one of chance, targeting squares at random and hoping for a “hit.” In the Battleship game, once the player positions and arranges their ships they cannot move them so in turn they become static targets. One could say the same holds true for our classic cyber security defenses. Once we position all our defensive sensors across our environments they remain static.

But is there a better strategy? In Cybersecurity we tend to deploy strategy in a similar fashion. We establish a perimeter, network and internal protections with Firewalls, Security Gateways, IPS’s, Endpoint Security etc., and wait for the adversary to guess where to attack us. They then refine their method until they achieve their objective. Clearly it is time for a change in cybersecurity game theory.

One concept that has not been yet fully explored is that of the Moving Target Defense (MTD). Not a new concept by any means, early research dates back to prior to 2011, however it is one I believe requires much more attention by the industry. The Department of Homeland Security (DHS) defines MTD as the concept of controlling change across multiple system dimensions in order to increase uncertainty and apparent complexity for attackers, reduce their window of opportunity and increase the costs of their probing and attack efforts. DHS believes in this concept so much they have invested Research & Development money to advance the idea past the concept stage.

MTD assumes that perfect security is unattainable. Given that starting point, and the assumption that all systems are compromised, research in MTD focuses on enabling the continued safe operation in a compromised environment and to have systems that are defensible rather than perfectly secure.

MTD will enable us to create, analyze, evaluate and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency.

In an ideal case, I envision a scenario where an administrator would have the ability to set via policy variable time intervals to “move or shift” an entire network environment, or enclave including applications along with changing privileged account credentials, and leave a ghost network (think honeynet) in its place to capture forensics data for further review and analysis. There are several new innovative cybersecurity companies out there that have developed unique and forward-thinking deception technologies. I look forward to seeing what the art of the possible is in this space in the near future!

Good luck and good hunting…. Here is to you never having to say, “you sunk my battleship!”C

Source : : Blog