Class Is in Session: Improving Cybersecurity Awareness in the Education Sector

The education industry faces a security crisis, one that goes beyond protecting the classrooms and hallways. IT professionals in the education sector see cybersecurity as their top priority, consistently ranking it as their No. 1 concern. However, more than three-quarters of employees in the education field lack the cybersecurity awareness required to handle common privacy […]

The post Class Is in Session: Improving Cybersecurity Awareness in the Education Sector appeared first on Security Intelligence.

Continue reading Class Is in Session: Improving Cybersecurity Awareness in the Education Sector

How to Build a Corporate Culture of Cyber Awareness

The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy.

The post How to Build a Corporate Culture of Cyber Awareness appeared first on Security Intelligence.

Continue reading How to Build a Corporate Culture of Cyber Awareness

Insights From RSAC 2018: Taking the Human Element Out of Security

At RSAC 2018, many speakers urged organizations to take the human element out of the security equation as much as possible by investing in automated tools and focusing on professional development.

The post Insights From RSAC 2018: Taking the Human Element Out of Security appeared first on Security Intelligence.

Continue reading Insights From RSAC 2018: Taking the Human Element Out of Security

Social Engineering: A Trick as Old as Time

Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.

The post Social Engineering: A Trick as Old as Time appeared first on Security Intelligence.

Continue reading Social Engineering: A Trick as Old as Time

How Effective Is Security Awareness Training for Threat Prevention?

Employees represent the first line of defense against cyberthreats, and effective security awareness training is more crucial than ever given the volatility and sophistication of the threat landscape.

The post How Effective Is Security Awareness Training for Threat Prevention? appeared first on Security Intelligence.

Continue reading How Effective Is Security Awareness Training for Threat Prevention?

Practical Attacks with DNS Rebinding

One of the tools I expect to see gain in popularity in the wild is DNS rebinding. DNS rebinding is a technique that turns a victim’s browser into a proxy for attacking private networks. Attackers can change the IP associated with a domain name af… Continue reading Practical Attacks with DNS Rebinding

Five Steps for Investigating and Responding to Employee Fraud

In the rush to deflect blame in the wake of an insider attack, many organizations fail to answer critical questions that could help them avoid similar cases of employee fraud in the future.

The post Five Steps for Investigating and Responding to Employee Fraud appeared first on Security Intelligence.

Continue reading Five Steps for Investigating and Responding to Employee Fraud

Five Surprising Reasons to Invest in Better Security Training

Security training programs should go beyond the basics and address why phishing attacks, social engineering schemes and other insider threats impact employees personally.

The post Five Surprising Reasons to Invest in Better Security Training appeared first on Security Intelligence.

Continue reading Five Surprising Reasons to Invest in Better Security Training

Signs That Your Security Program Is Going Nowhere Fast

Even if you have all the training, policies and technologies under the sun, your security program is useless if your organization lacks common goals and self-awareness about its defense capabilities.

The post Signs That Your Security Program Is Going Nowhere Fast appeared first on Security Intelligence.

Continue reading Signs That Your Security Program Is Going Nowhere Fast

Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

A data breach simulation is a great way to test your team’s crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.

The post Practicing Your Crisis Response: How Well Can You Handle Right of Boom? appeared first on Security Intelligence.

Continue reading Practicing Your Crisis Response: How Well Can You Handle Right of Boom?