Cyber Security tips for Google+                                       traffic news duiih


Cyber Security tips for Google+





 A survey has been led by Evaluserve and analyzes responses from 495 organizations about security on the internet. The included countries are: United States, Canada, United Kingdom, Germany, France, Brazil, Australia, Singapore and New Zealand. Surveyed companies have between 1,000 and 50,000 employees.


The objective of the survey was to identify some of the key trends facing businesses in the development of their strategic security plans.


Respondents were identified with different States of maturity of the security. These categories help us to understand the mentality of companies in it refers to the security of the business information. The following terms describe the level of maturity of the security of organizations participating in the survey.



Nearly a third of the organizations surveyed or not they have acquired or have not implemented many of the next generation security technologies designed to today's threats. While more than 80% of organizations identifies malware, spyware and viruses as a major security threat.
Cyber Security tips for




"Each organization must have a security approach by layers, using processes and solutions designed to prevent putting into danger." "In addition, the fact that the company goes well beyond the walls of the Office and the perimeter of firewalls complicated risk management and protection of data" says Jill Kyte, Vice President of McAfee. "Companies are giving access to the networks to their partners and workers, and in some cases, customers." Employees have access to the corporate network using mobile devices, many of which are owned and, therefore, the company does not control what network access. On the other hand, data and applications are being transferred to hybrid and public virtual environments in which the data owners have direct control over security. "All this requires that the company has a strategic security plan."Cyber Security tips for


Conclusions most notable

While organizations working in their strategic security plans and strive to protect their business systems and mission-critical data, much remained to be done.


Achieve a higher level of maturity in it refers to security. Only 16% of respondents places your organization at an optimal level. Worse is the fact that 9% of organizations are reactive in its approach to security you.


The Executive involvement is crucial. While the it and security personnel develop the plan, it is important to have knowledge of those people who know best the business systems and data using. The participation of executives is critical to inculcate the importance of security to the entire organization.



Analyzes quickly, frequently and makes the necessary adjustments. What does a plan if it is not implemented? Unfortunately, 29% of companies "conformists" would never make a mock of the response would be to an incident. Plus, the fact that 79% of the companies surveyed had security incidents last year, indicated that there are holes in the security plans.

Use the budget allocations with prudence. All managers would like to have a large budget to implement more protection, optimized companies try to achieve the best level of performance with the same budget level, companies are less prudent with their budgets.


Use the tools suitable for current threats. The survey shows that 45% of the companies have not implemented the next generation of firewalls. Mobile security is another area that should not be ignored, that 25% of organizations have not acquired any tools for this purpose.


The DNA of the company - protecting confidential corporate data. Main priorities for 2012 include the implementation of important controls to protect sensitive data and continuity of the business. Also the high-priority activities means the improvement of each organization to the security. This is hopeful because without acknowledging or mitigate security threats, a company will be the next to hold owners - and nobody wants to hold this dubious honor.


Here are some safety tips for users of social networking google+ according to the Kaspersky lab.
Cyber Security tips for

Managing profile

The edition of profiles section is the core of the privacy of the Google+. It provides a versatile interface that allows the user to customize the way of sharing information. Those who want your profile to be open, can share personal data and their demographic data with billions of Internet users. For the more reserved, there is an option to only share certain information with certain groups of contacts. To check how it will appear the profile, simply click on "View profile as...". If we are concerned that some stranger can find our profile, simply access the bottom of the edit page to disable "search visibility" and engines to block the search for the profile.



A visit to the Centre of privacy 

 Google Privacy Center is a good tool if the user is concerned about the information you share on Google+. It centralises the functions of privacy and the majority of the products and services of the company. It should be taken into account both Center security family Google+ and as the policy of privacy to confirm what type of information you want to offer in the social network.


A circle to rule them all!

If you use Google+, you must master the art of the management of the circle that these circles are the privacy of Google+ control center. They allow to create groups of friends and associates with a powerful user interface that makes it easy to limit who can see what. It is easier to share everything with everyone, but it is worth being careful in the Organization of the circles.


the visibility of the network (g) +

Their circles are never revealed to other users of Google +, but your friends know Yes by default. Depending on who let Access follow, can be dangerous. Fortunately, there is a way to limit who can see your friends and followers Google +. On the Privacy tab in share, there click on "edit visibility of the network". In this way, only there to clear the two boxes to hide who is added to the circles and keep them privately.


Mass messaging - Huddle

The new feature Google+ Huddle is a messaging platform group that allows users to communicate en masse. It should be be careful - there is a fine line between bringing together groups and the sending of spam. On the one hand, to manage a group will send a text message to designated Huddle friends. If not they have downloaded the application, they will have to reach an agreement with Google's service conditions before taking part in the conversation. Friends can begin to join other users using names, circles, emails, so it is important to be cautious with how organizing circles and check carefully before launching a "huddle" mass.
Cyber Security tips for



+1  in privacy

The "+ 1" is the response from Google+ equivalent to the button "I like" Facebook. As with Facebook, when you click on the "+ 1" notable an article or post that you like on another web site and post it directly on your wall. But unlike Facebook, Google + it is easier to control who will see the link. We should pay attention to how the "+ 1" are published and think twice before allowing that our fans can see it (Google + authorize it by default).


Links and privacy

If you are subscribed to other web sites (a blog, Facebook, Twitter, or Tumblr profile) then Google + "Links" are a great way to consolidate your online life and that they can also impact (or threaten) the privacy online. To add sites to "Links" you can choose to "public", associating it with the profile of Google + link, or keep the private link. Circles can also be used with limited access to the Links. allowing only friends can see your links, but not his co-workers for now, this seems to be a focus of everything or nothing - that these same rules apply to all links but eventually, Google + can do these policies more granular, offering control over the visibility of the sites individually.
Cyber Security tips for