CybSafe’s analysis of ICO data finds the number of incidents of ransomware reported has doubled in a year. What action can leaders make to reduce their risk of falling victim to attacks?
Download this white paper and learn:
Why ransomware is on the rise;
How phishing works as the on-ramp to ransomware;
How...
It’s clear, and it has been for a long time, that traditional tickbox security awareness training efforts aren’t working. And they’re not working because they make little or no effort to change people’s behaviour.
To reduce human cyber risk, security awareness training must go beyond raising awareness and...
By focusing on meaningful security metrics, organisations can benchmark, assess progress, and measure with a view to reducing the risk inherent in the human aspect of cyber security.
Download this white paper and learn:
Why metrics are so important;
What makes a metrics "meaningful";
How to use meaningful...
Technology alone it is not enough to protect you from modern cyber threats. Cybercriminals regularly exploit the human element. By focusing on changing people’s behaviour, cyber resilience can be achieved.
Download this white paper and learn about:
Tackling the human aspect of cyber security;
The psychology of...
If the process of building a cohesive security plan seems daunting, or there just isn’t enough time, expertise or resources to complete the project yourself, help is here for building, maintaining and continuously evolving your cybersecurity program to meet current and future challenges.
Download this whitepaper...
Roger Lang, who has experience in SaaS and fintech and has invested in various cybersecurity companies, says that education is the key to making real progress on cybersecurity issues.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
The U.K. Cyber Security Council is a new self-regulatory body for the profession. It is tasked by the U.K. government to execute its vision for the U.K. to be one of the safest places to work and do business online, says the chair of the council’s board of trustees, Dr. Claudia Natanson.
In theory, organizations are best protected by a layered security approach to cybersecurity based on best-in-class security tools.
In reality, the desired outcome is rarely achieved.
Why? Because most teams are not fully trained to use the technology on which their security program is built.
Download this...
The day-to-day pressures of being a CISO are enormous and extend to matters far beyond those of incident response time. Meanwhile, traditional approaches to training cybersecurity team members have either been limited by scalability, lack of hands-on learning, or cost.
So, how much can Simulation-based Cybersecurity...
How can the security and HR organizations partner to foster a better, enterprisewide culture of security? This is what Steve Luczynski and Valerie Utsey did in previous roles, and they share insights from their presentation on the topic at RSA Conference 2021.
Cybersecurity training: from dry-as-dust videos to cutesy animations of hapless office workers to streams of green code on a black screen. The variety out there is staggering, and it’s hard to know where to start – or what's really going to work.
Luckily, the most effective forms of training – for all teams,...
'Mega breaches' might sound dystopian, but they're becoming an all too familiar feature of the modern cyber crisis. Yet organizations are still relying on traditional techniques to prepare and exercise their workforces' cyber crisis response. Enter micro-drilling: the modern alternative to tabletop exercising.
In...
Small businesses have been disproportionately affected by hackers in recent months. To aid in countering the threat, Mastercard has launched a cybersecurity education effort targeting this market segment. Paul Trueman, a senior vice president Mastercard, explains the “Trust Center” initiative.
What really makes a "strong" password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?
For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries'...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.