i3 - November/December 2016 - 36

Android attacks nearly
doubled from 2014 to 2015
(8.19 billion).

As EMV cards and
digital wallets increase
in popularity, cyber
criminals are scrambling
to monetize stolen cards.

Cyber criminals are doing than
stealing information - they are
exposing it.

spot a phish, segment the network, and
integrate secure authentication procedures to limit the impact of a successful
phish should it occur, and monitor the
network for signs of data exfiltration.

TRAINING THE NEXT GENERATION
SECURITY WORKFORCE
So, who is going to help protect companies from phishing and other attacks?
Conventional wisdom says "If you want
a job, go into computing; if you want a
job for life, go into cybersecurity."
Cybersecurity is a profession that has
zero unemployment. The demand for
cybersecurity practioners at all levels far
outpaces the supply. So how do we increase the supply? IT professionals can
easily build a bridge from technology to
security. With some training, a network
administrator can move into incident
responder or a developer might choose
to focus on secure development. Additionally, there are many non-practitioner professionals who might want a
strong cyber background for their careers in law, analytics, or policy. So how
can one get into the field and gain this
level of knowledge?

Learn about cyber trends at the CES
CyberSecurity Forum Presented by
CyberVista on January 5, 2017.

DIGITAL HYGIENE
CHECKLIST:
You can protect
your personal data

Ransomware is spreading
to IoT devices including
cars, baby monitors, and
medical devices.

Critical infrastructure operating
systems are often obsolete,
vulnerable, and internet connected.

CERTIFIED PROFESSIONAL
Certifications represent an achievement
that employers can recognize. As an
example, backed by (ISC)², a nonprofit
organization, the CISSP (Certified Information Systems Security Professional) is
considered a gold standard certification
in the industry. In order to earn the CISSP, a practitioner must pass a 6-hour
exam and have 5 years of applicable
experience. For those new or transitioning into the profession, (ISC)² offers the
Associate of (ISC)² program. This designation shows off a new entrant's cybersecurity chops having passed the exam
and allows for full certification as soon
as the experience is gained.

CYBER RESILIENCE
The question of whether an organization might get hacked has long been
answered. No one is safe, but organizations can achieve resiliency by viewing
cybersecurity as an enterprise risk. A
cyber aware culture starts with education, includes strong policies and procedures, and supports the training and
development of cyber professionals. Cybersecurity isn't a technology issue it's a
people problem. Cybersecurity is everybody's business.

 Don't Use Public Wi-Fi
It is increasingly easy for individuals to
intercept personal information over public Wi-Fi in a hotel, coffee shop, or on a
plane. Only use wireless networks you
trust like those in your workplace, home,
or over a personal mobile hotspot device.

 VPN
If you must connect to a Wi-Fi network
outside of your work or home, use a VPN
service. The use of a virtual private network (VPN) provides a secure tunnel for
your data through hostile environments.

 Secure Password Storage
With computers getting computationally stronger, a hacker can guess an 8
character password in mere seconds. A
strong password is now recommended
as one with a minimum of 15 characters.
Generate strong passwords and store
them with a secure password manager.

 Two-Factor Authentication
A username and password are no longer sufficient in protecting personal accounts. Two-factor authentication (TFA)
provides additional security by employing the use of a second form of information that only you would be able to
access. Opt to use TFA with your bank,
Gmail, Dropbox, and other services that
store valuable personal information.

 OpenDNS
Protect your family, too. Young children
too often wander around unrestricted Internet connections at home. Lock down
what level of browsing your children can
do and prevent them from accessing
malicious websites using services like
OpenDNS.



Table of Contents for the Digital Edition of i3 - November/December 2016

Contents
i3 - November/December 2016 - Cover1
i3 - November/December 2016 - Cover2
i3 - November/December 2016 - Contents
i3 - November/December 2016 - 2
i3 - November/December 2016 - 3
i3 - November/December 2016 - 4
i3 - November/December 2016 - 5
i3 - November/December 2016 - 6
i3 - November/December 2016 - 7
i3 - November/December 2016 - 8
i3 - November/December 2016 - 9
i3 - November/December 2016 - 10
i3 - November/December 2016 - 11
i3 - November/December 2016 - 12
i3 - November/December 2016 - 13
i3 - November/December 2016 - 14
i3 - November/December 2016 - 15
i3 - November/December 2016 - 16
i3 - November/December 2016 - 17
i3 - November/December 2016 - 18
i3 - November/December 2016 - 19
i3 - November/December 2016 - 20
i3 - November/December 2016 - 21
i3 - November/December 2016 - 22
i3 - November/December 2016 - 23
i3 - November/December 2016 - 24
i3 - November/December 2016 - 25
i3 - November/December 2016 - 26
i3 - November/December 2016 - 27
i3 - November/December 2016 - 28
i3 - November/December 2016 - 29
i3 - November/December 2016 - 30
i3 - November/December 2016 - 31
i3 - November/December 2016 - 32
i3 - November/December 2016 - 33
i3 - November/December 2016 - 34
i3 - November/December 2016 - 35
i3 - November/December 2016 - 36
i3 - November/December 2016 - 37
i3 - November/December 2016 - 38
i3 - November/December 2016 - 39
i3 - November/December 2016 - 40
i3 - November/December 2016 - 41
i3 - November/December 2016 - 42
i3 - November/December 2016 - 43
i3 - November/December 2016 - 44
i3 - November/December 2016 - 45
i3 - November/December 2016 - 46
i3 - November/December 2016 - 47
i3 - November/December 2016 - 48
i3 - November/December 2016 - 49
i3 - November/December 2016 - 50
i3 - November/December 2016 - 51
i3 - November/December 2016 - 52
i3 - November/December 2016 - 53
i3 - November/December 2016 - 54
i3 - November/December 2016 - 55
i3 - November/December 2016 - 56
i3 - November/December 2016 - 57
i3 - November/December 2016 - 58
i3 - November/December 2016 - 59
i3 - November/December 2016 - 60
i3 - November/December 2016 - 61
i3 - November/December 2016 - 62
i3 - November/December 2016 - 63
i3 - November/December 2016 - 64
i3 - November/December 2016 - 65
i3 - November/December 2016 - 66
i3 - November/December 2016 - 67
i3 - November/December 2016 - 68
i3 - November/December 2016 - Cover3
i3 - November/December 2016 - Cover4
http://www.nxtbook.com/nxtbooks/manifest/i3_20190910
http://www.nxtbook.com/nxtbooks/manifest/i3_20190708
http://www.nxtbook.com/nxtbooks/manifest/i3_20190506
http://www.nxtbook.com/nxtbooks/manifest/i3_20190304
http://www.nxtbook.com/nxtbooks/manifest/i3_20190102
http://www.nxtbook.com/nxtbooks/manifest/i3_20181112
http://www.nxtbook.com/nxtbooks/manifest/i3_20180910
http://www.nxtbook.com/nxtbooks/manifest/i3_20180708
http://www.nxtbook.com/nxtbooks/manifest/i3_20180506
http://www.nxtbook.com/nxtbooks/manifest/i3_20180304
http://www.nxtbook.com/nxtbooks/manifest/i3_20180102
http://www.nxtbook.com/nxtbooks/manifest/i3_20171112
http://www.nxtbook.com/nxtbooks/manifest/i3_20170910
http://www.nxtbook.com/nxtbooks/manifest/i3_20170708
http://www.nxtbook.com/nxtbooks/manifest/i3_20160102
http://www.nxtbook.com/nxtbooks/manifest/i3_20160304
http://www.nxtbook.com/nxtbooks/manifest/i3_20160506
http://www.nxtbook.com/nxtbooks/manifest/i3_20160708
http://www.nxtbook.com/nxtbooks/manifest/i3_20170506
http://www.nxtbook.com/nxtbooks/manifest/i3_20170304
http://www.nxtbook.com/nxtbooks/manifest/i3_20170102
http://www.nxtbook.com/nxtbooks/manifest/i3_20161112
http://www.nxtbook.com/nxtbooks/manifest/i3_20160910
http://www.nxtbookMEDIA.com