Security Awareness

Security Awareness news, information, and how-to advice

Hurricane Matthew
trojan horse virus

oval office white house

With risk accountability, and a resilient, sustainable cyber workforce for all...

Cyber security within the public sector is at a critical juncture. The recently signed executive order on cybersecurity is a promising development.

medical records laptop doctor

Ransomware makes healthcare wannacry

The NHS ordeal is a wakeup call to healthcare administrators as to what needs to be done to make sure patients and their data are safe. Find out what advice vendors provide.

three check marks blackboard list

Wanna stop WannaCrypt? Don't pay ransoms, backup data, and train employees

Top 3 things for CISOs and IT security teams to do in response to the WannaCry ransomware outbreak.

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

ransomware contained container

Your data has been kidnapped… now what?

If you think you're not a target for a cyberattack recent "ransomware" incidents should make you think again. Ransomware attacks are different than what most people perceive as a cyberattack. There's no theft of data or interest in...

stan black
Q&A

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He talks about how security has changed among employees in each generation.

nyse building

Kevin Mitnick performs hacking tricks, live on Wall Street

The second annual Cyber Investing Summit, held on Wall Street at the New York Stock Exchange, announced that Kevin Mitnick, the world's most famous hacker, will be its opening act on May 23, 2017.

carrot stick incentives money

With security awareness, money talks

One problem with what we tell employees about taking security precautions is that the precautions interfere with their jobs.

phishing threat

Opinion: Some thoughts about Gizmodo's Phishing story

On Tuesday, Gizmodo published a story about how easy it was to get Trump Administration officials and associates to click a Phishing link. In order to do this, the Gizmodo Special Projects Desk developed a fake Google Docs email,...

mobile forensics

Computer forensics follows the bread crumbs left by perpetrators

As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime.

img 20170504 151717 01 01

Healthy security cultures eat lots of phish

The Google Docs phishing scam was widespread across the internet recently. Thanks to regular phishing training and a strong security awareness culture, our company was spared and as the CISO, I didn't even have to drive the effort....

swiss federal intelligence service

Not all is sweet. Swiss intelligence infiltrates German tax authorities

German tax authorities have been bribing Swiss bank personnel to reveal bank data since 2006. In late-April a Swiss national operating on behalf of the Swiss Federal Intelligence Service was arrested in Frankfurt, and charged with...

firewall hole

Third parties leave your network open to attacks

With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up?

beijing alley

China's spy hunting tactics

China’s counterintelligence capabilities continue to evolve. The newest arrow in their quiver to detect those who are breaking trust with Mother China is the “bounty” for identification of “suspicious foreigners.”

building blocks wooden toy

Boston Fed conference: Security still comes down to the basics

Not every bank has the money or the staff to do everything on the “best practices” lists of multiple regulatory agencies. But multiple speakers and panelists at the Boston Fed’s 2017 Cybersecurity Conference agreed that most financial...

clock and calendar montage
Infographic

April 2017: The month in hacks and breaches

Hacked emergency alarms, DDoS attack down under, extortion, and garden variety data losses and privacy breaches mark the month of April.

abandoned wallet

Human weakness enabling financial cybercrime

Cybercrime costs $3 trillion worldwide. One reason, a Boston police detective told a Boston banking audience, is because they make it too easy.

5 small business security

SMBs continue to be a target of cybercriminals

Believing that their security program is good enough means there's a good chance they’ll be breached. Here are some lessons from the bigs guys for the SMBs.

Load More