Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Whether you’re the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road.

The post Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know appeared first on Security Intelligence.

Continue reading Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Create Cyber Incident Response Policies for Any Type of Disaster

If your organization is proactive, you should have a cyber incident policy in place for that worst-case scenario of your files being compromised by a bad actor.

The post Create Cyber Incident Response Policies for Any Type of Disaster appeared first on Security Intelligence.

Continue reading Create Cyber Incident Response Policies for Any Type of Disaster

How to Explain Cybersecurity and Improve User Behavior at the Same Time

Knowing how to explain cybersecurity means focusing on what the asker already knows and their frame of reference so we can adapt our explanations to fit their knowledge.

The post How to Explain Cybersecurity and Improve User Behavior at the Same Time appeared first on Security Intelligence.

Continue reading How to Explain Cybersecurity and Improve User Behavior at the Same Time

Gamification Can Transform Company Cybersecurity Culture

Implementing game mechanics and competition into the mix can incentivize employees to improve their cybersecurity posture. Continue reading Gamification Can Transform Company Cybersecurity Culture

Executive Order on America’s Cybersecurity Workforce: From Strategy to Reality

President Donald Trump’s recent Executive Order on America’s Cybersecurity Workforce has created surprisingly little buzz within the cybersecurity training community. This is likely because, as exciting as it is to have the leader of the free world fo… Continue reading Executive Order on America’s Cybersecurity Workforce: From Strategy to Reality

Security Awareness Training Should Always Lead to Changes in Behavior

It’s important to recognize that a core outcome of security awareness and training efforts needs to be changing behaviors.

The post Security Awareness Training Should Always Lead to Changes in Behavior appeared first on Security Intelligence.

Continue reading Security Awareness Training Should Always Lead to Changes in Behavior

Penetration Testing Versus Red Teaming: Clearing the Confusion

There is some confusion in cybersecurity as to the difference between penetration testing and red teaming. Since all businesses have vastly different security needs, the distinction is critical.

The post Penetration Testing Versus Red Teaming: Clearing the Confusion appeared first on Security Intelligence.

Continue reading Penetration Testing Versus Red Teaming: Clearing the Confusion

Social-Engineer Newsletter Vol 09 – Issue 114

In This Issue: “Smile, Facial Recognition in Use.” Facial recognition software has been growing in popularity with companies and government agencies throughout the world. Can this technology be easily circumvented and used maliciously through social e… Continue reading Social-Engineer Newsletter Vol 09 – Issue 114

Social Engineering Training: Why Getting Hacked Is a Security Advantage

Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees.

The post Social Engineering Training: Why Getting Hacked Is a Security Advantage appeared first on Security Intelligence.

Continue reading Social Engineering Training: Why Getting Hacked Is a Security Advantage

Survey Surfaces Range of Cybersecurity Disconnects

A new survey of 300 IT professionals working in organizations with 100 or more employees conducted by Syncsort, a provider of tools for managing large amounts of data, finds 85 percent are confident in their organization’s cybersecurity even though 41… Continue reading Survey Surfaces Range of Cybersecurity Disconnects