Posted on October 4, 2017 by Admin
You’re standing on the bridge of the Starship USS Enterprise.
“Warning,” comes the voice of the computer. “Incoming attack detected.”
Immediately, your crew launch into action. Under your command, your officers identify the threat, take evasive action, and shut down the enemy using photon torpedoes.
The confrontation is intense, but within minutes your victory has been assured.
Sounds good, doesn’t it?
But here’s the thing. If you’ve ever seen Star Trek, you’ll know that all the screen
Posted on July 21, 2017 by Admin
July 21, 2017
Putting cookies in perspective, Girl Scouts USA (GSUSA) will offer cyber security badges starting in 2018. In a two-pronged approach, GSUSA embraces their growing concern for the safety of its young Scouts online. They also take aim with the significant lack of career focus for girls and women in IT and other sciences. Girl Scouts from 5 to 12 years old will be poised to pin on those 18 new badges in the coming year.
In 2011, the GSUSA challenged the future of its Scouts by
Posted on June 26, 2017 by Admin
There comes a time when every security conscious organization needs to move beyond the basics.
After all, basic protocols such as solid vulnerability management or least-privilege user access controls are highly effective, but they won’t be enough to stop truly persistent threats.
Perhaps your industry is heavily targeted by organized crime groups. Perhaps you’re worried about next generation ransomware, or you just can’t risk taking a hit to your reputation.
Whatever your situation,
Posted on June 5, 2017 by Admin
In the security world, people get a bad rap.
And it’s not hard to see why. Between social engineering, insider threats, and straight up human error, there are plenty of ways for your users to put the organization at risk.
In fact, according to many reputable sources, human error is the single greatest cause of data breaches.
So why, then, when we look at the average organization’s security budget, do we see so little attributed to security training? After all, budgets are supposed to be
Posted on January 19, 2017 by kellyk
With cyber-attacks reaching new heights year after year, organizations all over the world are starting to make security a top priority.
You are likely feeling the pressure to do something, but where should you start?
After all, there are so many security products on the market. From endpoint security and threat intelligence to multi-factor authentication and high-end training, the options seem limitless… and there’s no clear progression from start to finish.
In the coming weeks, we’ll be
Posted on December 15, 2016 by kellyk
Let’s face it. Email is always a threat.
So, naturally, you do everything to keep your users (and your network) safe. Your preventative measures are constantly being tested and improved, but still, your users are faced with malicious emails in their inboxes every single day.
And it gets worse. According to recent reports, one in every five spear phishing emails sent results in an opened link or attachment. With zero-day exploits being discovered at roughly the rate of one per month, that
Posted on November 30, 2016 by kellyk
Stephen Wyles, Information Security Analyst
It’s easy to inadvertently create a rut when conducting any repetitive task. Just as is the case with all training, when it comes to security, it’s important to create and repeat training that keeps employees alert and aware of the latest tactics used by attackers to gain access to sensitive information, systems, and facilities. But why is this important? Why do your employees need security training? And why should you care about a training rut?
Posted on November 21, 2016 by kellyk
Let’s face it. Mobile security is terrifying for system administrators.
Back in the old days, you always had the option of shutting down your network to prevent or limit the amount of damage.
You knew the physical location of every device, and the proverbial ‘big red switch’ could take every one of them offline.
Nearly every one of your employees has a company smartphone in their pocket. You can’t easily take them offline, you don’t know where they are, and who knows what they’re
Posted on October 20, 2016 by kellyk
When it comes to security awareness training, there don't tend to be too many surprises.
Most people know there are dangers associated with email, web browsing, and physical security.
But social media is a bit different.
Over the past decade, social media has revolutionized communication. People are connecting with forgotten friends, long lost family, and classmates from decades past.
So for most people, social media is no more than a tool for leisure and communication. They have no idea
Posted on October 4, 2016 by kellyk
Perhaps unsurprisingly, Internet security has taken a bit of a back seat in recent years.
With the rise of more direct attack vectors such as phishing, organizations seem to feel that the ‘old fashioned’ threat of malicious websites should be lower on their priority list. And that’s understandable… but not advisable.
In fact, with phishing getting all the headlines, it’s easy to forget that unsuspecting employees can easily introduce serious threats such as ransomware into your network just