Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Let’s be honest: cyber security employee training has a reputation for being dull. Most employees dread it. They expect dry training talks, lackluster presentations, and examples they can’t relate to.
In any training, people must come first. You should create a model that focuses on the people you’re trying to reach: your own employees. A people-centric approach lets you focus your cyber...
A lot of ink over the years has gone into comparing the most common generations within the workplace—and for a good reason. Generations are a great way to compare and study variations in broad subjects like the importance of job security, working habits, and technology usage.
These generalizations have been crucial data for many important workplace improvements, including cyber security awareness...
Every organization, regardless of size or revenue generated, needs an information security program (ISP), a collection of initiatives that form the basis for any cyber security plan involving confidential data.
A well-developed information security program enables your organization to take an inclusive approach to protecting data such as protected health information (PHI), personally identifiable...
Use these free phishing awareness resources to promote a security-aware workforce. The kit includes phishing infographics, end-user training videos and tips on how to recognize phishing emails.
Cyber Monday is right around the corner and this means employees will be shopping online at work. To prepare for the busiest online shopping day of the year, companies need to remind employees of how to be safe online.
It’s very easy for even the most cyber-aware employees to get caught up in the rush of online holiday sales and promotions. Retailers know that shoppers want deals and start their...
Leveraging a spirit of competition to drive engagement and create a security culture
Gamification is a popular concept these days, and for good reason. With gamification, you can develop a game for learning more about a serious topic while also getting the learner to approach winning that game with the same fervor they would when playing for entertainment. So what happens when you integrate...
While certainly not the biggest data breach in recent memory, this Rogers Communications incident demonstrates how a seemingly small employee error can have significant consequences in the realm of cybersecurity.
Data breaches have become major news topics and with good reason. These incidents have major implications not just for the businesses affected but also for their employees, their...
Nowadays, information security is a very common term used in the business world. Previously, security was simply a matter of installing a firewall to protect a corporate network by adding barriers to prevent intruders from access it.
In the last few years, information has become electronic, or should I say virtual, in its primary form. What used to be on hard copy or paper form is now stored,...