6 Signs of a Successfull Security Culture Security culture is much more than just IT policies and procedures. It requires buy-in and participation from every user. So, how do you know if you’re on the right path to building a security awareness culture? Read More. Belief Attitude Assumption Behavior Pattern Action Effects of Ransomware Don’t… Read more »
News
From the Office of Brian Jackson, “The Importance of Security Awareness Training”
Your employees are not the weakest link. They are the primary attack vector. Most organizations continue to place more trust in technology-based solutions than on training their employees to be more aware of the threat landscape and able to recognize the red flags associated with a cyber-attack. Organizations tend to see their employees as liabilities… Read more »
Employees Don’t Take USB Security Seriously
USB devices continue to be an entry point for cybercriminals that are looking for ways to access your data with lack of USB device security procedures. USB devices can be used to infect a machine with malware, trojans, or ransomware. According to secure-hardware vendor Apricorn’s The State of USB Data Protection 2019 report, USB devices… Read more »
Calculating the ROI on Security Awareness Training
ROI It’s no secret that investing in security awareness training for your employees can be costly. Even when the IT leaders in your organization understand the critical nature of such training, decision-makers in the C-Suite might not be so easily convinced. We are sharing how to calculating the ROI on security awareness training. The key… Read more »
Financial Firms are 300X More Likely to Receive Cyberattacks
Cybercriminals tend to go where the money is, which means that financial, payroll, and accounting firms are huge targets. Unfortunately, most financial firms are ill-prepared for cyberattacks and suffer higher in costs when a cyberattack happens. Global wealth-management trends found some shocking data around how poorly prepared financial firms are. In a survey where firms… Read more »
Cyber Criminals Refining Social Engineering Tactics
Attackers are improving their social engineering strategies by accounting for new developments in technology. Researchers at FireEye analyzed 1.3 billion phishing emails and identified three major trends in Q1 2019. First social engineering tactic that cyber crimminals are increasingly using impersonation in their phishing attacks. Impersonation attacks in 2019 have increased 17% over Q4 2018, primarily… Read more »
Stock Market Suffers After Data Breaches
The latest data from research firm Comparitech shows that organizations who suffer data breaches continue to suffer in the stock market well after the breach. After a breach, there are many costs incurred by organizations attempting to clean up the mess. Cost of investigations, communications, public relations, legal fees, and customer notifications are just some… Read more »
Red Flags Warn of Social Engineering
The easiest way to avoid falling for scams and other social engineering attacks is to understand the tactics employed by attackers. Here, we outline some of the most common scams and their warning signs. One of the most common signs of a scam is the use of “stressor events,” which play on the victims’ emotions… Read more »
Homeland Security Warns Against Phishing Threat in 2020 Elections
The US Department of Homeland Security warns against phishing threat in 2020 elections. Phishing attacks are a significant threat to the 2020 electionsUS Department of Homeland Security is warning state election officials that phishing attacks are one of the most significant threats to watch for as the 2020 elections approach. Phishing has been used in… Read more »
Effects of Ransomware Don’t End with Ransom
A Florida city is still struggling to recover from a ransomware attack after the city paid the ransom, according to the New York Times. The attack began after a city employee downloaded a malicious document that arrived in an email. This document downloaded the Emotet Trojan, which in turn downloaded the Trickbot Trojan, a type… Read more »