Does Your Security Awareness Program Put People First?

If people are the most important element of cybersecurity, why do many security awareness training programs fail to deliver the expected results?

The post Does Your Security Awareness Program Put People First? appeared first on Security Intelligence.

Continue reading Does Your Security Awareness Program Put People First?

Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

Reading Time: 4 minutes When implemented correctly, zero trust can improve a company’s resilience to recover after a breach. But when you don’t trust users to make good decisions and act accordingly, the system falls apart.

The post Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program appeared first on Security Intelligence.

Continue reading Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy

Reading Time: 3 minutes Organizations that fail to communicate identity and access management (IAM) processes in relevant business terms often struggle to gain user buy-in.

The post How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy appeared first on Security Intelligence.

Continue reading How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy

Women and Nonbinary People in Information Security: Tricia Howard

Last time, I got to speak with social engineering expert Jenny Radcliffe. This time, I got to speak with cybersecurity-minded client manager Tricia Howard. I got to learn even more about social engineering from her plus quite a bit about the importance… Continue reading Women and Nonbinary People in Information Security: Tricia Howard

Basic things that need to be explained to employees about a security policy and at what point in their employment

I was asked this question:

What are the basic things that need to be explained to every employee
about a security policy? At what point in their employment? Why? (List
at least 4 things).

Would the basic things be h… Continue reading Basic things that need to be explained to employees about a security policy and at what point in their employment

Social-Engineer Newsletter Vol 09 – Issue 114

In This Issue: “Smile, Facial Recognition in Use.” Facial recognition software has been growing in popularity with companies and government agencies throughout the world. Can this technology be easily circumvented and used maliciously through social e… Continue reading Social-Engineer Newsletter Vol 09 – Issue 114

Are Your Employees Really Engaging With Security Awareness Training?

Without security awareness training, security will not be front of mind for your end users — but that doesn’t mean that companies with formal programs are effectively engaging their employees.

The post Are Your Employees Really Engaging With Security Awareness Training? appeared first on Security Intelligence.

Continue reading Are Your Employees Really Engaging With Security Awareness Training?

Design Your IAM Program With Your Users in Mind

To gain the buy-in you need to make your IAM program successful, it’s important to consider your employees’ goals and needs during the design process.

The post Design Your IAM Program With Your Users in Mind appeared first on Security Intelligence.

Continue reading Design Your IAM Program With Your Users in Mind