You are here:-Tag: security

Getting back to the basics of online security and privacy: Own your online presence

Welcome to the last of our six-part series on getting back to the basics of online security and privacy. This story looks at how to own your online presence. Owning your online presence is all about protecting your privacy—from what you post on social media to your internet browsing habits, to the information that organizations

By |2018-11-26T08:32:43+00:00November 16th, 2018|Categories: Security|Tags: , , , , , , , , , , , , , |Comments Off on Getting back to the basics of online security and privacy: Own your online presence

Getting back to the basics of online security and privacy: Be web wise

Growing up, you probably learned some basic, common sense rules to live by--things like: look both ways before crossing the street, don’t touch the hot burner on the stove and never take candy from a stranger. As we continue our series about getting back to the basics of online security and privacy, we’ll discuss how

By |2018-09-05T15:40:45+00:00September 5th, 2018|Categories: Security|Tags: , , , , , , , , , , , , |Comments Off on Getting back to the basics of online security and privacy: Be web wise

Getting back to basics of online security and privacy: Connect with care

As mentioned in our previous stories about getting back to the basics of online security and privacy, it’s not all that difficult to stay cyber secure. Here’s how you can do it: Keep a clean machine Protect your personal information Connect with care Be “web wise” Be a good online citizen Own your online presence

By |2018-08-17T09:41:13+00:00August 17th, 2018|Categories: Security|Tags: , , , , , , , , , , , , , , , , , , , , , , |Comments Off on Getting back to basics of online security and privacy: Connect with care

Getting back to the basics of online security and privacy

Blue Cross and Blue Shield of Nebraska continually works to ensure the security and privacy of our computers, networks and sensitive information. Since people–not computers–are often the target of hackers, we want to educate you by posting a series of articles that reinforces how to stay safe online. Being cyber secure means doing these six

By |2018-07-05T16:28:53+00:00July 2nd, 2018|Categories: Security|Tags: , , , , , , , , , , , , , |Comments Off on Getting back to the basics of online security and privacy

Practice: Preparing for potential cyberattacks

Before any big event, it makes good sense to practice ahead of time to make sure everything runs smoothly. The more you rehearse, the more thoroughly everyone involved knows their roles and responsibilities, and can plan for every possible scenario. Weddings, theatrical performances, speeches, school or work presentations—everyone would likely agree that practice makes perfect

By |2018-04-16T16:00:35+00:00April 13th, 2018|Categories: Security, Stories, Topics|Tags: , , , , , , |Comments Off on Practice: Preparing for potential cyberattacks

Phishing messages: Don’t get hooked

Generally speaking, cyber criminals are fairly smart people—they usually take the path of least resistance to get their hands on whatever they want to steal. That’s why they continue to rely less on hacking computer systems, and more on something called social engineering -- especially phishing. Think of social engineering as hacking a person rather

By |2018-02-26T15:08:19+00:00February 26th, 2018|Categories: Security|Tags: , , , , , , , , , , |Comments Off on Phishing messages: Don’t get hooked

Out with the old, in with the new: how to securely get rid of that old computer

If you’re thinking about buying a new computer, you may be wondering what to do with your old one: do you toss it, let someone else in the family use it, or just hide it in the closet? Well, whichever you decide, there are some important things to know, and do, to ensure the security

By |2017-12-20T10:26:49+00:00December 19th, 2017|Categories: Security|Tags: , , , , , , , , , , |Comments Off on Out with the old, in with the new: how to securely get rid of that old computer

A cyber secure holiday season: Tweens, teens and technology

‘Tis the season for many tweens and teens to receive their first smartphone, tablet or other internet-connected device. When giving the gift of tech, parents should also do what they can to give the gift of online safety. While most young people have grown up with technology and are comfortable navigating their online lives, a

By |2017-12-20T10:27:56+00:00December 19th, 2017|Categories: Security|Tags: , , , , , , , , , , , |Comments Off on A cyber secure holiday season: Tweens, teens and technology