Signing Up for Benefits? Beware of Phishing Attacks

Over the next two months, companies should educate and test their employees to prepare for the rise in phishing attacks related to benefits enrollment and holiday party and charity campaign planning.

The post Signing Up for Benefits? Beware of Phishing Attacks appeared first on Security Intelligence.

Continue reading Signing Up for Benefits? Beware of Phishing Attacks

How Brad Olive Fights Fires With Security Awareness

Brad Olive has been spreading security awareness since the dawn of the internet. Today he develops personalized learning road maps aimed at various roles and user types for IBM Security Academy.

The post How Brad Olive Fights Fires With Security Awareness appeared first on Security Intelligence.

Continue reading How Brad Olive Fights Fires With Security Awareness

Why bother with certain types of 2fa if they can be easily bypassed?

In the wild, there is a method of bypassing 2fa. The gist of it is that the attacker doesn’t just phish the password, but they also phish the 2nd factor and use those for a real login on their own machine. (described in deta… Continue reading Why bother with certain types of 2fa if they can be easily bypassed?

How to Protect Your Organization From Insider Threats

Malicious actors outside your organization aren’t always the only ones at fault for data breaches. Comprehensive employee security training is crucial to minimize the risk of insider threats.

The post How to Protect Your Organization From Insider Threats appeared first on Security Intelligence.

Continue reading How to Protect Your Organization From Insider Threats

How to Protect Your Organization From Insider Threats

Malicious actors outside your organization aren’t always the only ones at fault for data breaches. Comprehensive employee security training is crucial to minimize the risk of insider threats.

The post How to Protect Your Organization From Insider Threats appeared first on Security Intelligence.

Continue reading How to Protect Your Organization From Insider Threats

Good analogy needed: Sec issues due to different coders implementing the same features in different ways for the same app

I have to give a school presentation about vulnerabilities found in the Moodle platform. Of course, they only apply to a legacy version which has since been patched.

The catch is that the presentation should be aimed at an a… Continue reading Good analogy needed: Sec issues due to different coders implementing the same features in different ways for the same app

How Effective Is Security Awareness Training for Threat Prevention?

Employees represent the first line of defense against cyberthreats, and effective security awareness training is more crucial than ever given the volatility and sophistication of the threat landscape.

The post How Effective Is Security Awareness Training for Threat Prevention? appeared first on Security Intelligence.

Continue reading How Effective Is Security Awareness Training for Threat Prevention?

Does being multi-lingual (in the ‘natural language’ sense) ever come in handy at all in information or network security?

I’m not professionally involved in security, so hopefully you can pardon me if I misuse any terminology or demonstrate my naivete in some other way. This question came to me as I was reading this paper on the role of language… Continue reading Does being multi-lingual (in the ‘natural language’ sense) ever come in handy at all in information or network security?