Are We Losing our Privacy?

Written by Merle

Continued from page 1

If you think that implementing a privacy policy isn't important, take a look at these statistics gathered by Forrester Research:

90% of online consumers want to control how their personal information is being used.

67% of consumers have reservations about giving out personal information online.

The government is trying to stay out of passing mounds of regulations on privacy issues, preferring "self regulation" instead. In 1998 they did pass "The Children's Online Privacy Act" (COPPA), making it mandatory that sites reveal how they deal with information received from minors without parental consent. European countries are much more strict when it comes to Internet Privacy Laws thenrepparttar US.

If you do create a privacy policy and userepparttar 132122 information collected in a different manner than stated in that policy, you may be held liable by The Federal Trade Commission. This type of deception is a violation ofrepparttar 132123 FTC Act, and is a very serious offense. So if you implement a policy make sure you stick to what it says.

Many ofrepparttar 132124 privacy site leaders offer a privacy seal program. If after creating your policy you think it has what it takes to be certified, check out

Becoming certified is an added plus for any commercial website and will help alleviate any fear of sharing information onrepparttar 132125 part of your website guests.

So how do you protect yourself while you're online? First, by being aware that every move you make may be recorded. Second, always read a site's privacy policy so you know what's being done withrepparttar 132126 information you do provide, if any. If you'd like to keep sites from gathering "invisible information" about you such as your IP address, operating system, etc., you may want to look into an anonymous browsing service which conceals your identity while surfing. Check out;

If you'd like to find out if a certain site has a privacy policy in place surf over to

Remember,repparttar 132127 temptation for website owners to sell personal information to third parties is high online due torepparttar 132128 demand for that information by advertisers. Make sure you're doing your part by being aware of who you're giving your information to, and knowing what they are doing with it.

Merle's Cyber Promotions (M.C.) Creating Visibility Online for Small Business...because just having a site isn't enough. Visit the site to receive FREE e-books packed with marketing & promotional tips that will help your site get traffic. Also subscribe to MC Promotions Press Newsletter to subscribe

Will your network pass a security audit?

Written by Michael Bruck

Continued from page 1

Companies must also considerrepparttar value ofrepparttar 132121 audits deliverables/results. Deliverables must not only detail all ofrepparttar 132122 current vulnerabilities, but also prioritize what issues are important, document proven methodologies for remediatingrepparttar 132123 vulnerabilities, and provide cost-effective methods to mitigaterepparttar 132124 risk. The majority of companies cannot afford to maintainrepparttar 132125 staff and application software necessary to conduct an audit at this level. Even those companies that do have such a significant security budget often use an outsourced firm to validate their own efforts.

Some additional benefits of a professional outsourced audit are: recording an objective baseline and changes on a periodic basis, having a trusted security partner to turn to as issues arise, andrepparttar 132126 ability to meet industry requirements for objective third-party auditing. For those companies outsourcing audits as a secondary check, it also assists in justifying security budgets, by validatingrepparttar 132127 current security-related expenditures.

Although it was mentioned that companies are sometimes challenged with prioritizing security matters, based on our own experience there is a trend with technology executives, to place a higher priority on network security. The newfound emphasis applies to both internal and external audits and really comes into play with those companies that have a great reliance onrepparttar 132128 Internet and business continuance.

Finding all of your vulnerabilities is increasingly difficult without a full suite of auditing tools, but remember, findingrepparttar 132129 vulnerabilities is only halfrepparttar 132130 battle. In order for audit deliverables to be truly effective they have to include professional feedback on what issues are important, remediation efforts detailed and prioritized, as well as describe how all ofrepparttar 132131 effort and expense will affectrepparttar 132132 level of risk.

If you feel your systems environment could pass a security audit, but haven ít had one, our experience shows you might be surprised by a failing grade. If you have had an audit andrepparttar 132133 vulnerabilities were exposed, hopefully you have an action plan you are utilizing to eliminaterepparttar 132134 vulnerabilities. Oncerepparttar 132135 action plans are complete, you might consider outsourcing your next audit to validate your efforts.

Michael Bruck is the founding partner of Bruck and Associates, Inc. an 8 year old Information Security consulting firm. Mr. Bruck leads his security team with a successful 16-year background in IT management and senior engineering positions. He can be reached through the website at or by email:

    <Back to Page 1 © 2005
Terms of Use