Click here to close now.

Welcome!

Security Authors: Pat Romanski, Vormetric Blog, Elizabeth White, Liz McMillan, Brad Thies

News Feed Item

Consumers Encouraged to Protect Their Privacy Online

AT&T and iKeepSafe Recognize National Data Privacy Day by Providing Consumer Tips on How to Protect Your Privacy Online

SAN FRANCISCO, Jan. 27 /PRNewswire-FirstCall/ -- The Internet offers an exciting world of information and entertainment at the click of a mouse. Consumers are spending hours surfing, shopping, playing games and communicating online, but as with any activity, it is important to put security, privacy and safety first. As U.S. businesses and consumers mark tomorrow, January 28, 2010 as National Data Privacy Day, consumers are encouraged to examine how they currently protect themselves online, and what steps they can take to ensure their privacy is secure when connecting through a mobile device, home broadband or any other Internet connection.

"We commend the work of iKeepSafe and others in the community who work every day to help keep consumers safe online," said Ken McNeely, President, AT&T California. "At AT&T, we are dedicated to promoting online safety awareness and education and providing our customers with the necessary tools to be safe and responsible digital citizens."

AT&T and iKeepSafe offer the following important tips for consumers to use to determine how best to protect their privacy online:


      What happens online stays online...forever. The Internet helps us
       enhance our social and civic lives. As you post the picture from
       spring break, or share your most intimate details or views,
       remember many Websites and social networks are public, and
       information posted online is often permanent and searchable.

      Know with whom you are sharing information online. Social media
       sites, chat rooms and other online forums can be anonymous, and
       some people may be pretending to be someone they are not. Be as
       suspicious of a stranger online as you are of strangers in public
       places.

      Review privacy policies, privacy settings and profile preferences.
       Be cautious of giving out personal information, particularly your
       Social Security number and names of family members, unless you are
       familiar with the company and its Web site privacy policy.  Many
       companies, like AT&T, have made it easier to understand their
       policies.

      Keep virus and spyware protection up to date and in place. Computer
       viruses often look like something they are not - such as a picture,
       screen saver or even a Web link. Some spyware programs can track
       everything you do online and send this information to an
       unauthorized user, leaving you vulnerable to identity theft.
       Antivirus and spyware protection programs scan and monitor your
       computer for viruses and spyware and then alert you before damage
       occurs. AT&T offers its broadband customers the award-winning AT&T
       Internet Security Suite powered by McAfee(R), which offers protection
       on up to 10 PCs and is included with qualifying plans.

      Avoid sending sensitive personal data over public connections. Be
       aware that many public computers, such as those at the library, and
       unsecured Wi-Fi connections can enable other users nearby to
       capture the information you are sending or receiving. If you have
       to use an unsecured or public connection, make sure the site is
       secure.  The AT&T Wi-Fi network supports secure Virtual Private
       Network (VPN) access. If you have VPN, AT&T recommends that you
       connect through it for optimum security.

      Never respond to emails or pop-ups asking for personal data or
       passwords. Use filtering software to help block unwanted e-mail
       and to reduce the likelihood of receiving viruses and spyware from
       unknown senders. Also use pop-up and ad-blocking features that
       let you control the quantity and type of pop-ups you receive or to
       block them completely.

      Use a strong password for all devices and accounts. Use combinations
       of letters, numbers, upper and lower case characters, and symbols
       in your passwords, and change your passwords frequently.

      Find websites on your own; don't use links in emails or on other
       sites. "Phishing," also known as "brand spoofing" or "carding," is
       a trick Internet scammers use to "fish" for consumers' financial
       information and password data using fake company e-mails and Web
       sites. Many companies, like AT&T, will not send e-mail requests to
       customers asking for personal account or credit card information.
       Instead of clicking the link in the e-mail, go to the site
       directly from your browser or search engine.

      Look for signs that a Website is secure before sending financial or
       personal data. Secure sites will often show a "lock" icon or there
       will be an "s" after the "http" ("https://"). If you don't see
       these indications, then the site is probably not secure and you
       should carefully consider whether to send personal or financial
       data over the site.

      Talk to your kids, teens, and tweens. Teach children to never share
       their name, address, phone number, school name or any other
       personal information about their family while online.

      Use the parental control tools available to make your job easier.
       Parental controls, such as AT&T's Smart Limits, enable you to
       establish sensible boundaries around the technology your family
       uses on a daily basis and to determine how and when your children
       can use their phone, computer or other connected device.

Last year, AT&T announced its support with the American School Counselor Association of iKeepSafe's Project PRO, an effort to teach students how to protect their privacy and reputation online. Project PRO enables school counselors, parents and teens to become an active part in managing a student's digital reputation through innovative educational resources such as video clips and training documents. To date, more than 4,200 educators and counselors throughout the country have sought out the curriculum.

"The Internet Keep Safe Coalition is thrilled to work with AT&T in commemoration of Data Privacy Day, and to join the effort in helping to raise awareness and educate the public on data safeguards," said iKeepSafe President Marsali Hancock. "We applaud AT&T's efforts to expand awareness about the need to protect your security, privacy and safety to families nationwide. Let this Day serve as a catalyst for all of us to improve the way we manage our personal privacy online."

To help consumers have a safer online experience, AT&T offers a full library of supportive Internet safety and security tips and interactive safety games for children, all available at http://www.att.com/safety.

*AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc.

About AT&T

AT&T Inc. (NYSE: T) is a premier communications holding company. Its subsidiaries and affiliates - AT&T operating companies - are the providers of AT&T services in the United States and around the world. With a powerful array of network resources that includes the nation's fastest 3G network, AT&T is a leading provider of wireless, Wi-Fi, high speed Internet and voice services. AT&T offers the best wireless coverage worldwide, offering the most wireless phones that work in the most countries. It also offers advanced TV services under the AT&T U-verse(SM) and AT&T | DIRECTV(SM) brands. The company's suite of IP-based business communications services is one of the most advanced in the world. In domestic markets, AT&T's Yellow Pages and YELLOWPAGES.COM organizations are known for their leadership in directory publishing and advertising sales. In 2009, AT&T again ranked No. 1 in the telecommunications industry on FORTUNE® magazine's list of the World's Most Admired Companies. Additional information about AT&T Inc. and the products and services provided by AT&T subsidiaries and affiliates is available at http://www.att.com.

© 2010 AT&T Intellectual Property. All rights reserved. 3G service not available in all areas. AT&T, the AT&T logo and all other marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.

SOURCE AT&T Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems, will focus on how to set up a cloud data governance program and s...
Every innovation or invention was originally a daydream. You like to imagine a “what-if” scenario. And with all the attention being paid to the so-called Internet of Things (IoT) you don’t have to stretch the imagination too much to see how this may impact commercial and homeowners insurance. We’re beyond the point of accepting this as a leap of faith. The groundwork is laid. Now it’s just a matter of time. We can thank the inventors of smart thermostats for developing a practical business application that everyone can relate to. Gone are the salad days of smart home apps, the early chalkb...
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been involved at the beginning of four IT industries: EDA, Open Systems, Computer Security and now SOA.
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focused on understanding how industrial data can create intelligence for industrial operations. Imagine ...
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, representing a model of how to analyze rea...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes for use cases across the industrial, enterprise, and consumer segments.
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
CommVault has announced that top industry technology visionaries have joined its leadership team. The addition of leaders from companies such as Oracle, SAP, Microsoft, Cisco, PwC and EMC signals the continuation of CommVault Next, the company's business transformation for sales, go-to-market strategies, pricing and packaging and technology innovation. The company also announced that it had realigned its structure to create business units to more directly match how customers evaluate, deploy, operate, and purchase technology.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along with a steady stream of well-publicized data breaches, only add to the uncertainty
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add scalable realtime functionality with minimal effort and cost.”
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness, and in-car entertainment and this excitement will bleed into other areas. On the commercial side, m...