To keep privacy top-of-mind between annual training, an awareness program should be created. Awareness programs use informal, unscheduled mechanisms to remind your staff about protecting personal ...
As such, end-users must be taught not only how to recognize social engineering and phishing threats, but also how to treat them, report them and ensure their colleagues aren’t falling foul to them.
There’s an old adage in cybersecurity that humans are the weakest link in the security chain. That’s increasingly true, as threat actors compete to exploit credulous or careless employees. But it’s ...
When it comes to cybersecurity, there’s so much emphasis centered on technology—keeping networks, devices and IT environments safe—that organizations often forget hackers aren’t always targeting ...
Global organizations face particular cultural and linguistic challenges when it comes to awareness training. Here's how 2 companies met that challenge and what you can learn from their experience. If ...
The difference between a protected device and one which is exposed to hackers can be as simple as a click away, which is why William & Mary Information Technology (W&M IT) works diligently to increase ...
In 2014, a Durham, N.H., police officer opened what she thought was a digital fax attached to an email about an investigation she was working on. Earlier this year, an employee at the Lansing Board of ...
When we hear the word “cybersecurity” a lot comes to mind — firewalls, antivirus, endpoint protection, email security, web security and much more. But how often do we think or talk about people? This ...
The Security E-Learning Training Series presents contemporary security content in a new and exciting way by incorporating text, voice, video, animation, simulation, interactive sessions, testing and ...
I am often asked for security case studies and best practices in a variety of cybersecurity areas. Who is doing best in whatever the cyber-topic is? Any case studies to help? How can I learn more? One ...
It’s the kind of breach that companies fear: workers giving out network log-in names or changing passwords when asked to by someone posing as an IT staffer. The best firewalls on the market can’t ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results