Saturday, December 13, 2014

Cyber Business Bureau


Cyber Business Bureau | Offering unique services for you or your company. Twitter Is Tracking What Apps You Have on Your Phone. Here's How to Turn It Off
http://bit.ly/1uD5zRM

Thursday, November 20, 2014

VIDEO: Attribution Testing Is Everything, Says SAP [#CZLBKK] | ClickZ


In this video interview, SAP's Crispin Sheridan shares the importance of testing for ad optimization of multichannel advertising.
http://bit.ly/1yZzS83

Wednesday, November 19, 2014

DuckDuckGo


The search engine that doesn't track you. A superior search experience with smarter answers, less clutter and real privacy.
https://duckduckgo.com/

Sunday, November 16, 2014

Cyber Business Bureau released Latest Cyber Threats & Vulnerabilities

Keep your eyes open for anything on this list if u find something thing on this list. Please feel free to contact #Mills Metz Law We use them as our # Miami EntertainmentAttorney's millsmetzlaw.com 

#CCIG Security  check list
[Recent threats and vulnerabilities].

Common Threats
Latest Vulnerabilities 
>1Phishing Scams
>3Unvalidated Redirects and Forwards
>4Injection Flaws
>5Cross-Site Scripting
>6Cross-Site Request 
>7Forgery
>8Insecure Cryptographic Storage
>9Insecure Direct Object References
>10Unrestricted URL Access
>11Unauthorized Uploads >12Vulnerability in Joomla! 2.5.13 and Earlier Versions

Wednesday, August 6, 2014

How to stop Safari from tracking you

Some websites keep track of your browsing activities when they serve you content, which enables them to tailor what they present to you. Safari can ask sites and their third party content providers (including advertisers) not to track you.

With this setting enabled, each time Safari fetches content from a website, Safari adds a request not to track you but it’s up to the website to honor this request.

Block cookies and other website data

Websites often store cookies and other data on your device. This data may include information that you have provided, such as your name, email address, and your preferences. This data helps websites identify you when you return so the site can provide services for you and show information that might be of interest to you.

By default, Safari accepts cookies and website data only from websites you visit. This helps prevent certain advertisers from storing data on your device. You can change your preferences so that Safari always accepts or always blocks cookies and other website data.

Smart Search Field

Safari has one field for searches and web addresses so you can browse the web from one convenient place. When Search Engine Suggestions are enabled, Safari will ask your selected search engine for suggestions based on what you’ve typed.

With Preload Top Hit enabled, as soon as Safari determines a Top Hit based on your bookmarks and browsing history, Safari will begin loading the webpage in the background. If you disable this option, the page will load normally.

Fraudulent Website Warning

When Fraudulent Website Warning is enabled, Safari will display a warning if the site you are visiting is a suspected phishing site. Phishing is a fraudulent attempt to steal your personal information, such as user names, passwords, and other account information. A fraudulent website masquerades as a legitimate one, such as a bank, financial institution or email service provider.

Private Browsing

When Private Browsing is enabled, Safari doesn’t remember the pages you visit, AutoFill information, and your open tabs aren’t stored in iCloud. Safari will also ask sites and their third party content providers (including advertisers) not to track you. Websites can’t modify information stored on your device, so services normally available at such sites may work differently until you turn off Private Browsing.

Note: While Private Browsing is enabled, the Safari user interface appears dark instead of light.

Saturday, July 12, 2014

Know How Your Site Will Look on Different Kinds of Screens and Web Browsers

www.internettvshow.com It's easy enough to put together a design for a web site when you're the only person who's viewing it. When it's live on the web, however, it'll be showing up on screens of all shapes and sizes in various web browsers. Before you deploy, you're going to want to test and make sure things look the way you want. Screenfly can show you how your site will look on different displays. Browsershots will let you see how your site is rendered by manydifferent browsers running on Windows, OS X, and Linux. All you have to do is choose the browsers you want and wait for screenshots to appear. It may not be as efficient as testing your site on an actual computer, but it's certainly much more affordable.

Saturday, May 24, 2014

PK SECURITIES

              PK SECURITIES 

Mary Packer, 2014
PK Securities' close working relationships with Providers ensure that our clients enjoy access to a maximum of quality prescreened bids from qualified providers. Our meticulous attention to detail during the negotiation, competitive bidding and documentation phases, ensures that client objectives are fulfilled with the highest yield, the most flexible terms and the maximum security available.


Saturday, March 8, 2014

Cyber Business: “The tables have turned but one of us will Always ...

Cyber Business: “The tables have turned but one of us will Always ...: “The tables have turned but one of us will Always be sitting at it” #CCIG     Mary Packer, CFO   Cyber Corporate Infrastructure Gro...

Cyber Business:    “The tables have turned but one of us will Alwa...

Cyber Business:    “The tables have turned but one of us will Alwa...:    “The tables have turned but one of us will Always be sitting at it”™   #CCIG Cyber Security Department. Tips for Using Pub...

2013 Cyber Business Bureau Awards Cyber Corporate Infrastructure Group "Pioneer's of Cyber Business"

“The tables have turned but one of us will Always be sitting at it” #CCIG
 
  Mary Packer, CFO
  Cyber Corporate Infrastructure Group
 
"Adam Barish, CEO"  Mary Packer is internationally recognized as the Who's Who in finance and industry. Firm Role; Professional Activities: Ms, Packer is involved in the firm’s senior management, including as a member of the firm’s Policy Committee. She writes and lectures on corporate and securities topics, including mergers and acquisitions and corporate governance.
 
Mary has over 30 years experience in the finance industry. In addition to her current consulting and CFO position at the Cyber Corporate Infrastructure Group ("CCIG")  she is currently the President of PK Securities, Inc.  a registered Municipal Advisor with the MSRB and SEC. Previously she  established PackerKiss Securities, Inc. and PK Advisors, Inc;  the firms were nationally recognized for their innovations in the field of tax-exempt bond proceeds reinvestment, providing reinvestment and derivative services to state and local Issuers nationwide totally in excess of $125 billion in tax-exempt bond proceeds.

In 1984, Ms. Packer joined the New York office of Morgan Stanley & Co., Inc. to establish its tax-exempt reinvestment department, advising, structuring, and placing proceeds from numerous tax-exempt financings nationwide. Between 1979 and 1984, she was an assistant vice president in the public finance department at The First Boston Corporation in New York City and was instrumental in initiating many of the innovative concepts on which the reinvestment industry is based. Prior to 1979, she was an assistant vice president in the international asset management department at Merrill Lynch Government Securities, Inc, also located in New York City. She is a Board member of  the International Humanitarian Aid Foundation (“IHAF”) and a Dame of Grace of the  Knights  Hospitallers, Soverign Order of Saint  John of Jerusalem, Knights of Malta.

Ms. Packer received a B.S. degree from Syracuse University.  She attended New York School of Business and received her M.B.A. from Fairleigh Dickinson Graduate School of Business.  She has held Series 3 (National Commodities Futures), Series 7 (General Securities Representative), Series 24 (General Securities Principal) and Series 63 (Uniform Securities Agent State Law Examination) licenses with the NASD, and had been a featured speaker world-wide.

Contact Information for Mary Packer:
email: assetdepartment@cybercorporateinfrastructure.com
CCIG Internet TV Show | The New Way of how you watch inernet television   “The tables have turned but one of us will Always be sitting at it”™ 

 #CCIG Cyber Security Department.

Tips for Using Public Wi-Fi Networks

"AB" Cyber Corporate Infrastructure Group

How Encryption Works:
Encryption is the key to keeping your personal information secure online. Encryption scrambles the information you send over the internet into a code so that it’s not accessible to others. When using wireless networks, it’s best to send personal information only if it’s encrypted – either by an encrypted website or a secure Wi-Fi network. An encrypted website protects only the information you send to and from that site. A secure wireless network encrypts all the information you send using that network.

How to Tell If a Website is Encrypted:
If you send email, share digital photos and videos, use social networks, or bank online, you’re sending personal information over the internet. The information you share is stored on a server – a powerful computer that collects and delivers content. Many websites, such as banking sites, use encryption to protect your information as it travels from your computer to their server.

To determine if a website is encrypted, look for https at the beginning of the web address (the “s” is for secure). Some websites use encryption only on the sign-in page, but if any part of your session isn’t encrypted, your entire account could be vulnerable. Look for https on every page you visit, not just when you sign in.

Don’t Assume a Wi-Fi Hotspot is Secure:
 Most Wi-Fi hotspots don’t encrypt the information you send over the internet and are NOT secure.

 If you use an unsecured network to log in to an unencrypted site – or a site that uses encryption only on the sign-in page – other users on the network can see what you see and what you send. They could hijack your session and log in as you. New hacking tools – available for free online – make this easy, even for users with limited technical know-how. Your personal information, private documents, contacts, family photos, and even your login credentials could be up for grabs.

An imposter could use your account to impersonate you and scam people you care about. In addition, a hacker could test your username and password to try to gain access to other websites – including sites that store your financial information.

 Protect Yourself When Using Public Wi-F:
 So what can you do to protect your information? Here are a few tips:

  • When using a Wi-Fi hotspot, only log in or send personal information to websites that you know are fully encrypted. To be secure, your entire visit to each site should be encrypted – from the time you log in to the site until you log out. If you think you’re logged in to an encrypted site but find yourself on an unencrypted page, log out right away.
        •    Don’t stay permanently signed in to accounts. When you’ve finished using an account, log out.
        •    Do not use the same password on different websites. It could give someone who gains access to one of your accounts access to many of your accounts.
        •    Many web browsers alert users who try to visit fraudulent websites or download malicious programs. Pay attention to these warnings, and keep your browser and security software up-to-date.
        •    If you regularly access online accounts through Wi-Fi hotspots, use a virtual private network (VPN). VPNs encrypt traffic between your computer and the internet, even on unsecured networks. You can obtain a personal VPN account from a VPN service provider. In addition, some organizations create VPNs to provide secure, remote access for their employees.
        •    Some Wi-Fi networks use encryption: WEP and WPA are the most common. WPA2 is the strongest. WPA encryption protects your information against common hacking programs. WEP may not. If you aren’t certain that you are on a WPA network, use the same precautions as on an unsecured network.
        •    Installing browser add-ons or plug-ins can help, too. For example, Force-TLS and HTTPS-Everywhere are free Firefox add-ons that force the browser to use encryption on popular websites that usually aren't encrypted. They don’t protect you on all websites – look for https in the URL to know a site is secure.
         Tagged with: computer security, network, personal information, privacy, public, wi fi, wireless   
     
     CONTACT US @
    [P] 1(561)866-3825
    [F] 1(561)347-8799