Articles By Joan Goodchild

Tumblr login credentials stolen in phishing attack

Tumblr is dealing with an aggressive phishing campaign. Only recently launched, it aims to steal log-in credentials and employs many of the well-known social engineering tactics that scammers use on social media sites

Published on: June 28th, 2011 Joan Goodchild

How to do a social background check the legal way

As more people create Facebook profiles (500 million and growing), and sign on to the many social media sites available today, hiring managers are finding they have new opportunities to get background information

Published on: June 17th, 2011 Joan Goodchild

Security concerns hindering cloud commitment

Concerns about the security of cloud applications are keeping a significant number of organizations from going further with deploying more of the technology, according to a new report. CDW LLC, a provider of technology products

Published on: June 1st, 2011 Joan Goodchild

How to do a digital disappearing trick

In a world where we share more information online than ever before, it might seem impossible to disappear completely. But Frank Ahearn can help. A professional skip tracer for many years, he tracked

Published on: May 4th, 2011 Joan Goodchild

VoIP attacks on the rise?

In its recent annual security report, Cisco predicted VoIP (Voice over Internet Protocol) abuse as a potential area for cyber crime growth."Criminals use brute-force techniques to hack private branch exchange (PBX) systems to

Published on: March 9th, 2011 Joan Goodchild

5 tips to make your CSO resume shine

The current challenges in today's job market didn't stop Phillip Mahan from bouncing back quickly after a setback. Mahan was laid off from his position as manager of information security and risk management

Published on: December 23rd, 2010 Joan Goodchild

Google adds 60 services to Google Apps

If you've been using Google Apps for work and other Google services for play, then you know the annoyance of juggling two accounts within one browser. That hassle ended Thursday as Mountain View

Published on: November 19th, 2010 Joan Goodchild

Facebook flubs and Twitter traps that can get you fired

Travis Megale is happily employed. A regular Facebook user, he knows how to use the site appropriately and what NOT to say or post. Unfortunately, many Facebook members do not. Job termination due

Published on: September 28th, 2010 Joan Goodchild

Five tricks workers use to visit blocked Web sites

There may have been a time when blocking certain sites was acceptable in most office environments. But what was once considered off-limits is now essential in many organizations. Social media sites like Facebook

Published on: August 16th, 2010 Joan Goodchild

How to spy on your kids like a pro

Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based communication platforms also enable new forms of an age-old parenting strategy: monitoring your

Published on: April 20th, 2010 Joan Goodchild

How to detect bogus job references

There have always been unethical and/or desperate job hunters out there who have used a friend or relative as a reference in order to up the chances of landing a position. Providing a

Published on: March 9th, 2010 Joan Goodchild

Quartet of online swine flu scams become malware pandemic

The words "swine flu" had barely been uttered last spring when spammers and malware authors, hoping to take advantage of fears and curiosity about the virus, began devising ways to trick people with

Published on: October 30th, 2009 Joan Goodchild

The latest e-commerce fraud schemes

E-commerce fraud costs retailers approximately $4 billion each year, according to the most recent results of an annual survey conducted by Cybersource, a provider of electronic payment and risk management services. Just this

Published on: July 17th, 2009 Joan Goodchild

Five easy ways to get infected with a computer virus

You can install the best firewalls, patch religiously, and make sure your anti-virus software is always up-to-date, but there is one online risk factor you can never control: the user. Whether they are

Published on: April 21st, 2009 Joan Goodchild

The top four security mistakes telecommuters often make

According to figures released recently by the Nemertes Research Group, an Illinois-based research advisory firm, as many as 71 per cent of U.S. companies offer full-time or part-time telecommuting to employees. Despite the

Published on: March 26th, 2009 Joan Goodchild