CTRL-ALT-DELETE Before You Leave Your Seat! Security Awareness and Training Through Positive Reinforcement

Security leaders should infuse positive reinforcement into their security awareness and training programs to encourage users to adopt best practices.

The post CTRL-ALT-DELETE Before You Leave Your Seat! Security Awareness and Training Through Positive Reinforcement appeared first on Security Intelligence.

Continue reading CTRL-ALT-DELETE Before You Leave Your Seat! Security Awareness and Training Through Positive Reinforcement

Across the Great Divide: Measuring Security Awareness Among US and UK Users

A survey revealed that while security awareness differs among users in the U.S. and U.K. in a variety of areas, both populations have a long way to go.

The post Across the Great Divide: Measuring Security Awareness Among US and UK Users appeared first on Security Intelligence.

Continue reading Across the Great Divide: Measuring Security Awareness Among US and UK Users

Psychological Security: Helping Your Team Think Like Cybercriminals

Psychological security refers to the notion that to defend a network against threats, security professionals must be able to think like cybercriminals.

The post Psychological Security: Helping Your Team Think Like Cybercriminals appeared first on Security Intelligence.

Continue reading Psychological Security: Helping Your Team Think Like Cybercriminals

Cloud Security Is Not an Either/Or

Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.

The post Cloud Security Is Not an Either/Or appeared first on Security Intelligence.

Continue reading Cloud Security Is Not an Either/Or

Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far

Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.

The post Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far appeared first on Security Intelligence.

Continue reading Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far

The Enemy Within: Identifying Insider Threats in Your Organization

According to recent research, privileged users and administrators represent the biggest insider threats to any organization’s sensitive data.

The post The Enemy Within: Identifying Insider Threats in Your Organization appeared first on Security Intelligence.

Continue reading The Enemy Within: Identifying Insider Threats in Your Organization

Creating a Culture of Security Through Change Management

Effective change management requires thorough planning, constant communication, and strong leadership capable of swaying the organizational culture.

The post Creating a Culture of Security Through Change Management appeared first on Security Intelligence.

Continue reading Creating a Culture of Security Through Change Management