Security awareness materials you can use – “Why we fall for cons”

One of my favorite parts of my job as a CSO is building security awareness amongst my colleagues. I really believe that the time put…
The post Security awareness materials you can use – “Why we fall for cons” appeared first on Security Boulevard.
Continue reading Security awareness materials you can use – “Why we fall for cons”

Is Business Email Compromise a “cyber attack?”

Just what constitutes a cyber attack? That’s the question facing a court in a case brought against insurer AIG. One of the firm’s clients was…
The post Is Business Email Compromise a “cyber attack?” appeared first on Security Boulevard.
Continue reading Is Business Email Compromise a “cyber attack?”

Security Awareness: 4 Tax Scams Making the Rounds Now

With the arrival of the month of April, the United States is heavily into tax season now. And with only days remaining until the April 15 deadline to file, tax-related scams are also pervasive this time of year. Email security firm Proofpoint notes in… Continue reading Security Awareness: 4 Tax Scams Making the Rounds Now

How should security user training be provided when implementing a company BYOD strategy?

Our company is implementing a BYOD policy. I am working with management to draft end user training guidelines / standards as senior member of the Information Security team. Our company is in a regulated industry and works rou… Continue reading How should security user training be provided when implementing a company BYOD strategy?

Assess Your Risks

We talk a lot about phishing, vishing, smishing, and impersonation here at SECOM, and there is a good reason for that. Those are the primary services we provide as a company for our clients. Not all clients use all of our services, and some companies d… Continue reading Assess Your Risks

In 2019, Test Impersonation Attacks

At SECOM, we perform many forms of social engineering attacks, from phishing to vishing and smishing as well as impersonation. All of these attacks are used regularly by actual attackers and should be tested as part of a robust security assessment in e… Continue reading In 2019, Test Impersonation Attacks