What Are the Biggest Security Threats to State and Local Governments?
Cybercrime is on the increase more than ever before and cybercriminals are becoming more notorious each day. It seems that the local and state governments have indeed become the main targets for...
View ArticleSecurity Awareness – The Payment Process and Securing the Weakest Link
Retail organizations have been a target of cyber criminals for a long time, as they can seize valuable personal information of employees and customers, including their credit card and banking details....
View ArticleHow Security Awareness Can Protect the Tech Industry
Introduction The tech industry often falls prey to new emerging cyberattacks. This doesn’t come as a surprise because of the valuable information these organizations hold. Employees in the tech...
View ArticleTop 10 Ways Your Healthcare Organization May be Violating HIPAA and Not Know It
HIPAA legislation was established by the US Federal Government in 1996. These are rules and standards designed to protect the security and privacy of patient health information. It has implemented...
View ArticleRole Based Security Awareness Training: Training Those Who Don’t Think They...
Introduction Security awareness training is essential for every person that has an email account and/or access to your company network. This can include everyone from the CEO to the receptionist;...
View ArticleWhy Does the Finance Industry Need Security Awareness Training?
Introduction In most cases, there are two most sought-after targets by the Cyber attacker: The passwords and the financial information of the intended victim. In most cases, the two go hand in hand,...
View ArticleSecurity Awareness for Executives
Introduction Executives have always been looked upon as whales, so to speak, by hackers. They have more privileges and more sensitive information with them than most of the employees in a company. It...
View ArticleSecurity Awareness: 7 Tips for Training Field Technicians
Supervisory Control and Data Acquisition (SCADA) is a system of software and hardware elements that allow industrial and governmental organizations to gather data in real time from mission-critical...
View ArticleHow Security Awareness Training Can Protect Law Enforcement
Why Does the Law Enforcement Industry Need Security Awareness? Law enforcement is not immune to cyber attacks. In fact, the sector faces multiple threats. How bad is it? We don’t know, and if we did,...
View ArticleSecurity Awareness Issues with Phishing
Come on down: the Phishing’s good and getting better “Phishing is a discipline in the equality of men—for all men are equal before phish.”[1] Most of us are so inundated with words like phishing,...
View ArticleTop 20 Security Awareness Slogans, Catchphrases, and Taglines
This article presents the top 20 popular security awareness slogans, catch phrases and taglines with short explanations and remarks. Differing slogans below the chart that explain the same problem are...
View ArticleHow to Use AlientVault SIEM for Threat Detection & Incident Response
Malware comes via attachments, malvertising, man-in-the-middle, man-in-the-browser, social engineering and countless other vectors. Even the most stringent of binary whitelisting can be quickly...
View ArticleIntroducing BEC: The Great White Shark of Social Engineering
The post Introducing BEC: The Great White Shark of Social Engineering appeared first on Infosec Resources. Introducing BEC: The Great White Shark of Social Engineering was first posted on April 1,...
View ArticleFree BEC eBook: The Great White Shark of Social Engineering
The post Free BEC eBook: The Great White Shark of Social Engineering appeared first on Infosec Resources. Free BEC eBook: The Great White Shark of Social Engineering was first posted on April 1, 2018...
View ArticleInsider Threat: How to Protect Your Business from Your Own Employees
It’s trite to write that the company’s data and customer base are the main assets of any business in the 21st century. However, the attitude to these assets is still careless: a sales manager can steal...
View ArticleTop 20 Security Awareness Posters with messages that STICK
Security awareness is a crucial consideration for businesses large and small today. Chances are good that you’ve invested a significant amount of time and money in security awareness training for your...
View ArticleThe Decline of Ransomware and the Rise of Cryptocurrency Mining Malware
1. Introduction ISACA, an international association focused on IT governance, has recently released its annual study “State of Cybersecurity.” The study relates to the year 2018 and is based on...
View ArticleAn Employer’s Guide to Employee Privacy and BYOD
Introduction For years, employers have turned to Bring-Your-Own-Device (BYOD) policies with the hope of boosting productivity. BYOD is a concept that allows employees to use devices in the workplace...
View ArticleOWASP Top 10 #7: Insufficient Attack Protection [Updated 2019]
“Security is always seen as too much until the day it’s not enough.” This quote by William H. Webster, an American attorney, jurist and current Chairman of the Homeland Security Advisory Council,...
View ArticleFree Resources for National Cybersecurity Awareness Month 2019 (NCSAM 2019)
National Cybersecurity Awareness Month is almost here! At Infosec, we jump at opportunities like NCSAM to shine the spotlight on cybersecurity best practices and we’re here to help you do the same....
View Article
More Pages to Explore .....