Dovell Bonnett

Free

Dovell Bonnett

Dovell Bonnett Quick Facts

A public biography is not available yet.

Articles by this expert

SelfGrowth articles and saved writing connected to this expert.

28 total
A

Article

Cyber Warefare – Safeguard Your Electronic Devices. When employees travel abroad here are ten electronic devices security tips I pulled from a recent New York Times article, “Traveling Light in a Time of Digital Thievery” by Nicole Perlroth. Nicole discusses electronic devices security policies and practices of the State Department, Google, Bookings Institution, and McAfee executives when traveling to China and Russia.

Recently added

A

Article

Fox News reported on 1/8/11 that ” Obama Administration Reportedly Plans to Create Internet ID for All Americans“. Obama wants the Commerce Department to create Internet ID for all Americans.

Recently added

A

Article

Recently McAffe published a worldwide hacking report about what they are calling Shady RAT. The United Nations, Olympic committees, governments, U.S. real estate company, a major media organization based in New York, a satellite communications company and other companies around the world, totaling 72 organizations, have been hacked by a “state actor”.

Recently added

A

Article

McAfee recently revealed that 72 different organizations around the world have been victims of cyber-spying. With attacks likely to increase, it is important to note that strengthening your access controls ensures that you have a higher level of security for all those who are attempting to access the network.

Recently added

A

Article

I have written many articles and blogs warning about the cost to a company from a security breach. Ben Worthen, a staff reporter in The Wall Street journal’s San Francisco bureau, wrote a great article “What to Do if You’ve Been Hacked” on September 26, 2011, where he has highlighted some key things to do. All the points are excellent but the #1 “to do” is to not ignore the attack and hope it goes away. It won’t! Here is some advice if your company network has been hacked:r

Recently added

A

Article

Microsoft®’s Forefront Needs More Than Identity Management for Cyber Attack Prevention

Recently added

A

Article

I have been following a very disturbing trend for a couple of months now, and it is that of Medical Identity Theft. When we think of identity theft, we typically worry about credit cards or store credit being taken out in our name. Somebody attempting to purchase a vehicle or finance a mortgage using our personal identity. What we don’t really think about however is medical identity theft.

Recently added

A

Article

Great information but forgot a key security component. User Authentication. On Wed 26th of October I attended the Information Systems Security Association (ISSA) Security Symposium in Long Beach, Califo ia. Different security leaders discussed poignant topics like Ali Pabrai’s, CEO ecfirst.com, “Checklist for Addressing Breach Readiness” to the lighter hearted David Perry’s, Global Director Education Trend Micro, presentation “Security from the Cloud, for the Cloud, and by the Cloud”. There were also a number of vendor stations discussing a wide array of security products and services.r

Recently added

A

Article

When you accept that cloud provider’s contract to store or backup your company’s data on their servers, did you read the fine print? According to Gartner, 2012 may be the year that Cloud Services gets a big boost because companies are looking to decrease IT costs, have more access form remote users and offer more services to your customers. But, at what cost?

Recently added

A

Article

Power LogOn® Authenticates User into Dameware™ Access Smart® Announces the Interoperability of their Power LogOn Password Manager with DameWare Development’s Mini Remote Control (DMRC) product.

Recently added

A

Article

Just say no when pushy sales clerks ask for TOO MUCH personal information.Well the Christmas season is upon us and we’re all out there shopping for presents for our loved ones. Just recently I was shopping at Best Buy to purchase some computer components, but when I got home I found that one items was broken.

Recently added

A

Article

This week the press is all agog about how Windows 8 is going to “securely” manage passwords. Win 8 will do this with LiveID, syncing passwords across multiple computer platforms, using “TrustedID” to authenticate the computer, and storing all your long complex passwords in the cloud or on your device. But the sense of security is still misplaced. When it comes to security, multi-authentication is the first topic that comes up, and these are: 1. Something you have. (Smart Card, token, etc.) 2. Something you know. (Password, PIN or pattern)r

Recently added