What Can We Learn From the ‘Global State of Information Security Survey 2018’?

While PwC’s “Global State of Information Security Survey” noted that governments have improved cyber resilience, businesses still have a long way to go.

The post What Can We Learn From the ‘Global State of Information Security Survey 2018’? appeared first on Security Intelligence.

Continue reading What Can We Learn From the ‘Global State of Information Security Survey 2018’?

Security Awareness Training Is a Team Effort

To promote security awareness throughout the organization, CISOs should invite employees in disparate departments to help design training materials.

The post Security Awareness Training Is a Team Effort appeared first on Security Intelligence.

Continue reading Security Awareness Training Is a Team Effort

Employees Must Wash Hands: 11 Tips to Translate Awareness Into Better Security Hygiene

Due to an influx of high-profile data breaches, employees are more security-aware than ever. But that doesn’t always translate to good security hygiene.

The post Employees Must Wash Hands: 11 Tips to Translate Awareness Into Better Security Hygiene appeared first on Security Intelligence.

Continue reading Employees Must Wash Hands: 11 Tips to Translate Awareness Into Better Security Hygiene

Make Security Culture Your Top Priority

An organization can have all the technology and expertise money can buy, but a poor security culture can still lead to devastating data breaches.

The post Make Security Culture Your Top Priority appeared first on Security Intelligence.

Continue reading Make Security Culture Your Top Priority

Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle

Executives need an external risk adviser to help them monitor the cyber risk landscape and implement, monitor and refine security controls accordingly.

The post Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle appeared first on Security Intelligence.

Continue reading Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.

The post Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks appeared first on Security Intelligence.

Continue reading Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.

The post Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks appeared first on Security Intelligence.

Continue reading Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

Cybersecurity is like a seat belt: While uncomfortable at first, it is crucial to the safety of your organization as it undergoes a digital transformation.

The post Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration appeared first on Security Intelligence.

Continue reading Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

Cybersecurity is like a seat belt: While uncomfortable at first, it is crucial to the safety of your organization as it undergoes a digital transformation.

The post Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration appeared first on Security Intelligence.

Continue reading Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

Six Key Traits of an Effective Cyber Risk Advisor

What makes a good cyber risk advisor? Here are six traits and abilities that you should look for in a trusted security advisor.

The post Six Key Traits of an Effective Cyber Risk Advisor appeared first on Security Intelligence.

Continue reading Six Key Traits of an Effective Cyber Risk Advisor