How Personality Influences Cybersecurity Behavior

In August 2019, ESET and The Myers-Briggs Company released preliminary findings of a fascinating study on the way personality types can influence cybersecurity behaviors. With just a snippet of the data available, it was possible that security awarene… Continue reading How Personality Influences Cybersecurity Behavior

We Need More Than Security Awareness to Combat Insider Threats

When I was new to this industry, I firmly believed that insider threats occurred because people didn’t know how to be safe online.

The post We Need More Than Security Awareness to Combat Insider Threats appeared first on Security Intelligence.

Continue reading We Need More Than Security Awareness to Combat Insider Threats

Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Whether you’re the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road.

The post Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know appeared first on Security Intelligence.

Continue reading Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Spear Phishing Gets Us Nearly Every Time: Lessons From Europol’s Report

Just how susceptible are people to phishing and spear phishing? Recent reports show an increase in phishing activity and sophistication as well as greater negative impacts.

The post Spear Phishing Gets Us Nearly Every Time: Lessons From Europol’s Report appeared first on Security Intelligence.

Continue reading Spear Phishing Gets Us Nearly Every Time: Lessons From Europol’s Report

3 Lessons From the Incident Response Tabletops

Here are three lessons I’ve learned about incident response from having run tabletop exercises within IBM and alongside our clients.

The post 3 Lessons From the Incident Response Tabletops appeared first on Security Intelligence.

Continue reading 3 Lessons From the Incident Response Tabletops

Cybersecurity: Chernobyl and its Cyber Lessons

Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident that threatened much of Eur… Continue reading Cybersecurity: Chernobyl and its Cyber Lessons

When Stalkerware Stalks the Enterprise

Stalkerware is a real problem that can lead to individuals being tracked and stalked via software on their smartphones. It’s also a growing and underappreciated threat to enterprises.

The post When Stalkerware Stalks the Enterprise appeared first on Security Intelligence.

Continue reading When Stalkerware Stalks the Enterprise

How to Protect Your Organization From Evolving Phishing Attacks

Protecting against evolving phishing attacks requires robust security awareness training for users and some help from technologies like artificial intelligence and ahead-of-threat detection.

The post How to Protect Your Organization From Evolving Phishing Attacks appeared first on Security Intelligence.

Continue reading How to Protect Your Organization From Evolving Phishing Attacks

How Gamification Can Improve Enterprise Cybersecurity Posture

Using gamification can help improve an organization’s overall security while making security a fun endeavor Chief information security officers (CISOs) and corporate security teams are tasked with defending their organization and its assets that… Continue reading How Gamification Can Improve Enterprise Cybersecurity Posture

How to Explain Cybersecurity and Improve User Behavior at the Same Time

Knowing how to explain cybersecurity means focusing on what the asker already knows and their frame of reference so we can adapt our explanations to fit their knowledge.

The post How to Explain Cybersecurity and Improve User Behavior at the Same Time appeared first on Security Intelligence.

Continue reading How to Explain Cybersecurity and Improve User Behavior at the Same Time