Because of the types and volume of data that MTU works with, and because of the risk of financial, reputational, and other harm to MTU and its affiliates due to social engineering and other cyber ...
The omnipresent and ever-increasing digital technology trends of today are quickly and significantly changing our lives. Today’s critical infrastructures, which include nuclear power and other ...
In every cybersecurity case, one thing is almost always true: Somewhere along the line, one or more employees made a mistake. It can be your accountant clicking on a link in a cleverly crafted scam ...
Employee training is a mainstay for most organizations, and the necessity for online cybersecurity awareness training can’t be overstated. Last year the FBI reported a staggering $12.5 billion has ...
Awareness training is great when people can hurt only themselves. But when people can hurt others, stronger measures are required During the recent RSA Conference in San Francisco, I was part of a ...
It is increasingly commonplace for organisations to undertake phishing simulations against their employees. There is a plethora of service providers as well as free resources to use for this purpose.
‘Humans are the weakest link’ has been the refrain of the IT security community for many years and, with social engineering attacks becoming ever more prominent and sophisticated, an organisation’s ...
There is a large discrepancy between the information technology (IT) security that organizations say they need and the level of education and prevention occurring within these organizations, according ...
Dark Reading, Cybersecurity Dive, Search Security cover the state of cyber awareness and how orgs can overcome struggles with ...
Want to improve how your organization delivers and absorbs security awareness training? Then it comes down to reinventing your approach, including gamification, says Barracuda's Michael Flouton. A ...
I am often asked for security case studies and best practices in a variety of cybersecurity areas. Who is doing best in whatever the cyber-topic is? Any case studies to help? How can I learn more? One ...
Understanding the importance of computer and network security, and building accountability for these concepts, is critical to achieving organizational goals. Customizable Download — The policy ...