Dovell Bonnett
Free

Dovell Bonnett Quick Facts
A public biography is not available yet.
Articles by this expert
SelfGrowth articles and saved writing connected to this expert.
Article
Ten Electronic Devices Security Tips When Traveling Abroad
Cyber Warefare – Safeguard Your Electronic Devices. When employees travel abroad here are ten electronic devices security tips I pulled from a recent New York Times article, “Traveling Light in a Time of Digital Thievery” by Nicole Perlroth. Nicole discusses electronic devices security policies and practices of the State Department, Google, Bookings Institution, and McAfee executives when traveling to China and Russia.
Recently added
Article
OBAMA ADMINISTRATION PLANS INTERNET ID
Fox News reported on 1/8/11 that ” Obama Administration Reportedly Plans to Create Internet ID for All Americans“. Obama wants the Commerce Department to create Internet ID for all Americans.
Recently added
Article
Shady RAT World Wide Hacking
Recently McAffe published a worldwide hacking report about what they are calling Shady RAT. The United Nations, Olympic committees, governments, U.S. real estate company, a major media organization based in New York, a satellite communications company and other companies around the world, totaling 72 organizations, have been hacked by a “state actor”.
Recently added
Article
Rumors of Password Death Are Greatly Exaggerated
McAfee recently revealed that 72 different organizations around the world have been victims of cyber-spying. With attacks likely to increase, it is important to note that strengthening your access controls ensures that you have a higher level of security for all those who are attempting to access the network.
Recently added
Article
What To Do When Your Company Network Is Hacked
I have written many articles and blogs warning about the cost to a company from a security breach. Ben Worthen, a staff reporter in The Wall Street journal’s San Francisco bureau, wrote a great article “What to Do if You’ve Been Hacked” on September 26, 2011, where he has highlighted some key things to do. All the points are excellent but the #1 “to do” is to not ignore the attack and hope it goes away. It won’t! Here is some advice if your company network has been hacked:r
Recently added
Article
Microsoft®’s Forefront Review
Microsoft®’s Forefront Needs More Than Identity Management for Cyber Attack Prevention
Recently added
Article
The Growing Threat of Medical Identity Theft
I have been following a very disturbing trend for a couple of months now, and it is that of Medical Identity Theft. When we think of identity theft, we typically worry about credit cards or store credit being taken out in our name. Somebody attempting to purchase a vehicle or finance a mortgage using our personal identity. What we don’t really think about however is medical identity theft.
Recently added
Article
ISSA's SoCal Security Symposium
Great information but forgot a key security component. User Authentication. On Wed 26th of October I attended the Information Systems Security Association (ISSA) Security Symposium in Long Beach, Califo ia. Different security leaders discussed poignant topics like Ali Pabrai’s, CEO ecfirst.com, “Checklist for Addressing Breach Readiness” to the lighter hearted David Perry’s, Global Director Education Trend Micro, presentation “Security from the Cloud, for the Cloud, and by the Cloud”. There were also a number of vendor stations discussing a wide array of security products and services.r
Recently added
Article
Is Your Cloud Provider Sidestepping Security?
When you accept that cloud provider’s contract to store or backup your company’s data on their servers, did you read the fine print? According to Gartner, 2012 may be the year that Cloud Services gets a big boost because companies are looking to decrease IT costs, have more access form remote users and offer more services to your customers. But, at what cost?
Recently added
Article
Power LogOn Works With Dameware
Power LogOn® Authenticates User into Dameware™ Access Smart® Announces the Interoperability of their Power LogOn Password Manager with DameWare Development’s Mini Remote Control (DMRC) product.
Recently added
Article
Don’t Surrender Your Privacy Just Because a Store Clerk Asks For Your ID!
Just say no when pushy sales clerks ask for TOO MUCH personal information.Well the Christmas season is upon us and we’re all out there shopping for presents for our loved ones. Just recently I was shopping at Best Buy to purchase some computer components, but when I got home I found that one items was broken.
Recently added
Article
Don’t Wait for Windows 8 to Secure Your Passwords
This week the press is all agog about how Windows 8 is going to “securely” manage passwords. Win 8 will do this with LiveID, syncing passwords across multiple computer platforms, using “TrustedID” to authenticate the computer, and storing all your long complex passwords in the cloud or on your device. But the sense of security is still misplaced. When it comes to security, multi-authentication is the first topic that comes up, and these are: 1. Something you have. (Smart Card, token, etc.) 2. Something you know. (Password, PIN or pattern)r
Recently added