Email security is a human issue

Research suggests that email is the most common point of entry for malware, providing access in 94% of cases, so it’s unsurprising that phishing is the root cause of 32% of security breaches. Just last month the UK government’s Cyber Security Breaches … Continue reading Email security is a human issue

RPV2 rocker plate gets stationary cyclists tilting and sliding

While stationary trainers do allow users to cycle indoors, the things tend to just sit there and spin – with a few exceptions, that is. Rocker plates add some tilting action, though, with KOM Cycling’s new RPV2 being the latest to hit the scene.Continu… Continue reading RPV2 rocker plate gets stationary cyclists tilting and sliding

61% of cybersecurity teams are understaffed

The pandemic’s disruption has rippled across the globe, impacting workforces in nearly every sector. However, according to the findings from a survey report from ISACA and HCL Technologies, the cybersecurity workforce has largely been unscathed, though… Continue reading 61% of cybersecurity teams are understaffed

Social media feed simulator Fakey teaches users to recognize credible content

As people around the world increasingly get their news from social media, online misinformation has emerged as an area of great concern. Social media feed simulator Fakey To improve news literacy and reduce the spread of misinformation, NYUAD Center fo… Continue reading Social media feed simulator Fakey teaches users to recognize credible content

The Key to Cybersecurity is an Educated Workforce

The United Kingdom’s National Cyber Security Centre (NCSC) handled a record number of cybersecurity incidents over the last year, a 20% increase in cases handled the year before. With the increasing number and more innovative nature of cyber attacks, … Continue reading The Key to Cybersecurity is an Educated Workforce

Use longitudinal learning to reduce risky user behavior

People ignore information that isn’t relevant to them, which is why IT and HR departments have been approaching security training incorrectly for years. Long-form, all-hands security seminar trainings have contributed to nearly daily data breaches for … Continue reading Use longitudinal learning to reduce risky user behavior

Middle market companies facing a record number of data breaches

Middle market companies possess a significant amount of valuable data but continue to lack appropriate levels of protective controls and staffing, according to a report from RSM US and the U.S. Chamber of Commerce. Middle market companies and data brea… Continue reading Middle market companies facing a record number of data breaches

IT security teams challenges fueled by record-setting cyberattacks

IT security teams faced unprecedented challenges last year fueled by dramatically expanded work-from-home (WFH) programs, increased bring-your-own-device (BYOD) policy adoptions, and rising internal and third-party risks stemming from the COVID-19 pand… Continue reading IT security teams challenges fueled by record-setting cyberattacks

Attackers can teach you to defend your organization against phishing

People click on links and attachments and will, unfortunately, keep clicking even if they should know better. They’ll click for the chance of winning a holiday, or even something as cheap as a $2 cup of coffee. No amount of awareness training is going … Continue reading Attackers can teach you to defend your organization against phishing

Five steps to get employees invested in security awareness training

Remote work has become a new normal for industries worldwide, which presents exciting opportunities but also has the potential to expose critical security weaknesses, since employees tend to let their guards down while working from home. Employees need… Continue reading Five steps to get employees invested in security awareness training