Security Training


4 Ways Every Employee Can Play a Role in Their Company’s Security

March 23, 2018 Added by:Tomáš Honzák

Employees can help a company avoid catastrophic data breaches and protect their own personal data more effectively.

Comments  (0)


Centering Your Security Strategy on Leadership, Resilience and Fundamentals

March 16, 2018 Added by:Steve Durbin

Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.

Comments  (0)


Increasing Board Accountability and Expertise Is Critical to Security and Risk Management

March 09, 2018 Added by:Greg Reber

The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.

Comments  (0)


The Five Secrets to Making Security Awareness Work in 2018

January 29, 2018 Added by:Perry Carpenter

Are you ready to make 2018 a break-out year for your security awareness program?

Comments  (0)


Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures

December 14, 2017 Added by:Liviu Arsene

Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.

Comments  (0)


Creating a Meaningful Security Awareness Training Program Is a 12-Month Commitment

December 11, 2017 Added by:Perry Carpenter

As an industry, do we do ourselves a disservice with National Cybersecurity Awareness Month (NCAM)?

Comments  (0)


Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job

December 11, 2017 Added by:Tim Critchley

A cybersecurity incident can adversely affect individuals within an organization, costing an employee their job, career and possibly their future.

Comments  (0)


From the Medicine Cabinet to the Data Center – Snooping Is Still Snooping

November 03, 2017 Added by:Jackson Shaw

A global survey revealed a lot of eye-opening facts about people’s snooping habits on their company’s network.

Comments  (0)


Surviving Fileless Malware: What You Need to Know about Understanding Threat Diversification

October 13, 2017 Added by:Bogdan Botezatu

Fileless malware is completely different than file-based malware in terms of how the malicious code is executed and how it dodges traditional file-scanning technologies.

Comments  (0)


Cyber Security in the Workplace Is Everyone’s Obligation

October 11, 2017 Added by:Joseph Carson

Cyber security is no longer just a technology challenge—it’s a test for everybody who uses and interacts with technology daily. That means: everyone in your organization.

Comments  (0)


Hey Alexa – Show Me Whitelisted Malware

October 10, 2017 Added by:Troy Kent

The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.

Comments  (0)


No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)


Security Awareness: Watch-Out for Hurricane Harvey Online Scams

August 28, 2017 Added by:Dan Lohrmann

As reported during previous natural disasters and global events, phishing is usually the path of least resistance for the bad guys to get the sensitive data they want without being detected. If they can become you, they can slowly steal the data over time and cover their tracks. In phishing, the bait is a clever message and you are the fish. We fall for the phishing bait, because the phishers are...

Comments  (0)


How Businesses Can Bolster Security and Stop Attacks Before they Happen

August 01, 2017 Added by:Chris Schueler

Organizations will have to realize that in-house efforts often won’t be enough when fighting off hackers with attacks they’ve sourced from around the world.

Comments  (0)


The Security Risk Within Smart Cities

June 30, 2017 Added by:Mirko Brandner

Smart cities offer great opportunities and, in terms of IoT innovations security, data protection and privacy have to be top priority if they should be profitable in the long run.

Comments  (0)


Exchanges in History: What Third Party Cyber Risk Management (TPRM) Programs Can Learn from the Past

March 09, 2017 Added by:Scott Schneider

Throughout history, whenever organizations, governments, or industries have used an exchange to share information, great transformation has taken place.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked