Don’t Respond to Suspicious Emails

Sometimes when sending phishing simulations to our clients, we setup a reply-to address to see if people will reply to suspicious emails and many do.
The post Don’t Respond to Suspicious Emails appeared first on Security Boulevard.
Continue reading Don’t Respond to Suspicious Emails

Grease the Skids: Improve Training Successes by Optimizing the Environment

You have carefully selected a training program. Employees are completing the courses. And yet, they are not reporting suspicious emails and their passwords are made up of favorite sports teams and graduation dates. What is missing?
The post Grease… Continue reading Grease the Skids: Improve Training Successes by Optimizing the Environment

Cyber Security Awareness Month: Checklist for a Cyberaware Life

Living in the city, we learn to tread cautiously in dodgy neighborhoods, ask hard questions of fast-talking salesmen and look both ways before crossing the street. But we increasingly live online. Most of humanity is just now trying to figure out what … Continue reading Cyber Security Awareness Month: Checklist for a Cyberaware Life

Training Not Sinking In? Try a Programmatic Approach

In honor of National Cybersecurity Awareness Month (CSAM), Dane Boyd, PhishLabs’ Security Training Manager, and I will share a series of posts covering topics from cybersecurity to organizational learning and development. We are kicking off … Continue reading Training Not Sinking In? Try a Programmatic Approach

Have We Conditioned Web Users to be Phished?

Have the well-meaning recommendations of the security community made web users more vulnerable to cyber attacks? Have we conditioned people to be phished?

The HTTPS Paradox

You know that little green padlock symbol that appears in your browser’s URL bar every now and then? What do you think it means?

The post Have We Conditioned Web Users to be Phished? appeared first on Security Boulevard.

Continue reading Have We Conditioned Web Users to be Phished?

Protecting Critical Infrastructure from Cyber Threats

In observance of National Cyber Security Awareness Month, Bitdefender delivers a series of articles on hot topics such as best practices in online safety and protecting your company’s assets and integrity. We also provide prerequisites to consider before seeking a career in cybersecurity. We encourage you to bookmark this blog or connect with Bitdefender on LinkedIn or Twitter to receive follow-on articles (filled with security tips) as they are published.

The post Protecting Critical Infrastructure from Cyber Threats appeared first on Security Boulevard.

Continue reading Protecting Critical Infrastructure from Cyber Threats

The Internet Wants You: Consider a Career in Cybersecurity

In observance of National Cybersecurity Awareness Month, Bitdefender offers a series of articles on hot topics such as best practices in online safety and protecting your company’s assets and integrity. We also suggest prerequisites to consider before seeking a career in cybersecurity. We encourage you to bookmark this blog or connect with Bitdefender on LinkedIn or Twitter to receive follow-on articles (filled with security tips) as they are published.

The post The Internet Wants You: Consider a Career in Cybersecurity appeared first on Security Boulevard.

Continue reading The Internet Wants You: Consider a Career in Cybersecurity

Credential Theft: How To Spot a Phish

When people think about phishing, their mind often turns immediately to ransomware. And for good reason. After all, there have been dozens of high profile ransomware attacks in recent months.

But you know what? An even greater proportion of phishing lures don’t contain ransomware. Instead of extorting money from you, they have an ulterior motive: they’re designed to steal your identity.

Well, OK. They’re designed to steal your login credentials… but in reality that isn’t far short of stealing your identity.

The post Credential Theft: How To Spot a Phish appeared first on Security Boulevard.

Continue reading Credential Theft: How To Spot a Phish