How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling. How do you get your employees to stop clicking on everything?

Categories:

Tags:

(Read more…)

Continue reading How do I get my employees to stop clicking on everything?

How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling. How do you get your employees to stop clicking on everything?

Categories:

Tags:

(Read more…)

Continue reading How do I get my employees to stop clicking on everything?

Attribution, and when you should care: Part 1

Attribution is the practice of taking forensic artifacts of a cyber attack and matching them to known threats against targets with a profile matching your organization. If this seems overly complicated, that is intentional. There are degrees of attribu… Continue reading Attribution, and when you should care: Part 1

Threat Modeling – What are you so afraid of?

There are many, many threat models available on the internet with extensive documentation on how to apply them to your organization. Most are designed to map out data flow, identify soft points in organizational processes, and assign mitigations based … Continue reading Threat Modeling – What are you so afraid of?