What Were BullPhish ID’s Top Phishing Scams of 2020?

What were the top phishing scams of 2020 that users fell for in phishing simulations? See the new data & why you need to do more training.
The post What Were BullPhish ID’s Top Phishing Scams of 2020? appeared first on Security Boulevard.
Continue reading What Were BullPhish ID’s Top Phishing Scams of 2020?

Cyber Security Roundup for January 2021

A suspected nation-state sophisticated cyber-attack of SolarWinds which led to the distribution of a tainted version the SolarWinds Orion network monitoring tool, compromising their customers, dominated the cyber headlines in mid-December 2020.  This w… Continue reading Cyber Security Roundup for January 2021

Seven Debunked Myths of Cybersecurity

Article by Kristin Herman is a writer and editor at Ukwritings.com and Stateofwriting.com

The term ‘cybersecurity’ has been tossed around lately. But although cybersecurity has been viewed as a saving grace for mobile devices, computers, etc. the topi… Continue reading Seven Debunked Myths of Cybersecurity

How to stop rampant, poor password practices

We’ve all heard about the consequences of poor password practices again and again. Yet, users still reuse their passwords for multiple accounts, create weak passwords, or use dictionary words and compromised passwords. Why do users still follow these … Continue reading How to stop rampant, poor password practices

Why a strong password policy is so important for your WordPress website

If you’ve been managing a WordPress site for a while, you may be wondering why a strong password policy is so important. Surely, users are aware that they need to use strong passwords? Unfortunately, many users knowingly use weak passwords, putting you… Continue reading Why a strong password policy is so important for your WordPress website

Trusting Passwords: Best Practices for Threat-Proofing Credentials

“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the creation of comp… Continue reading Trusting Passwords: Best Practices for Threat-Proofing Credentials

Tips for Protecting Your Password and Personal Data

This list is a combination of proactive steps you can take, as well as activities you should avoid for protecting your password and personal data. One of the main barriers to robust cybersecurity is an educated populace and willing participants. We all… Continue reading Tips for Protecting Your Password and Personal Data

The Updated Do’s and Don’ts of Password Security

When it comes to passwords, individual habits and organizational policies vary widely—unfortunately, the pattern is one of weakness. But organizational online security can be immediately improved by the implementation of a few key principles. Str… Continue reading The Updated Do’s and Don’ts of Password Security

Cyber Security Roundup for June 2020

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, May 2020.
EasyJet’s disclosure of a “highly sophisticated cyber-attack”, which occurred in January 2020, … Continue reading Cyber Security Roundup for June 2020