CyberheistNews Vol 2, #8
Editor's Corner
[caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption]
Security Through Education
Here is an excerpt out of the introduction of our new ISAT Version 2,
that your employees are going to hear when they do the new training:
"You may be wondering why you've been asked to take this training.
It is because cybercriminals have been targeting many organizations
just like yours. Hackers might break into your network with their
technical skills, but the trend is that more and more they try to
fool you into giving them some information or doing some action item
that will eventually give them access to your computer and your
private information. Its easier for them to trick you so they can
bypass your organizations firewall and antivirus software; they
just manipulate you so they can compromise your computer thats
connected to the companys network. And that is the reason you are
doing this course, because ultimately the only person that can
protect you and your organization is you."
We expect V2 to come out in the March/April timeframe, and are very
excited about it. Stay tuned!
Quotes of the Week
"Data is not information, information is not knowledge, knowledge
is not understanding, understanding is not wisdom." - Clifford Stoll
"There is no end to education. It is not that you read a book, pass
an examination, and finish with education. The whole of life, from
the moment you are born to the moment you die, is a process of learning." - Jiddu Krishnamurti
Please tell your friends about CyberheistNews! They can subscribe here:
http://www.knowbe4.com/about-us/cyberheist-news/
What Is Your Email Attack Surface?
Always been curious to find out what percentage of your employees
actually are Phish-prone™?
Did you know that almost half of all network malware infections are
caused by social engineering? Because cyber-attacks are rapidly
getting more sophisticated, the frustration level and risk continues
to mount for IT Administrators.
Take the first step now to improve your organizations defenses against
cybercrime. Fill out the form, and you will be able to start your Free
Simulated Phishing Attack. That allows you to find out what percentage
of your users is Phish-prone. The number is usually much higher than
you think.
You will get immediate access to start the simulated attack. We call it
the 'Phishing Security Test' (PST). Sign Up For Your FREE Simulated
Phishing Attack Now:
http://www.knowbe4.com/simulated-phishing-attack/
Security Awareness Training - Starting With Project Charter
Lance Spitzner at SANS came out with a great blog post. He recently
took Jeff Frisk's MGT 525 course on project planning. This is a great
class to take if you are going to be working on any large scale or
long term project, such as a security awareness program. Here are
the 7 key things that Lance identified, very useful!:
security-awareness-training-starting-with-project-charter/">http://www.securingthehuman.org/blog/2012/02/10/
security-awareness-training-starting-with-project-charter/
More Than Half Of Organizations Suffer Data Loss, Says CompTIA
An interesting piece of research this week from CompTIA. They released
their ninth annual 'IT Security in the Workforce' report. A whopping
one in five organizations say they know they experienced sensitive data
loss during in 2011. Another 32% told CompTIA that it was likely they
suffered data loss. But wait, there's more.
CompTIA VP of Research Tim Herbert suspects the actual percentage of
companies losing data is likely even higher. They are hacked but do
not know it. "Companies may never know the extent to which theyve
been harmed by sensitive data falling into the wrong hands." he said.
Five Tactical Security Metrics To Watch
Robert Lemos at Dark Reading had a good article this week. "Wondering
how secure the corporate network is? Here's five operational security
metrics that can help. Ask security professionals for a list of important
metrics, and expect to get a long list with much debate. Yet information
security managers need a way to keep track of their progress on securing
the network while watching out for potential threatening situations.
Good metrics can help define the fight. While many professionals might
argue that it's better to have as much information on the security of
their networks as possible, too much information can blind practitioners
to what is going on, says Mike Lloyd, chief technology officer for
network monitoring and discovery firm RedSeal Networks." Here they are:
perimeter-security/232600679/five-tactical-security-metrics-to-watch.html">http://www.darkreading.com/security-monitoring/167901086/security/
perimeter-security/232600679/five-tactical-security-metrics-to-watch.html
Cyberheist 'FAVE' LINKS:
* This Week's Links We Like. Tips, Hints And Fun Stuff.
Super Fave: Mountain bike rider Marcelo Gutierrez darts down city streets,
flights of stairs and sidewalks at breakneck speeds at the Valparaiso
Urban Downhill Race in Chile. Put your seatbelt on!:
http://www.flixxy.com/urban-downhill-bike-race-valparaiso-chile.htm
The scale of the universe. Move the horizontal scroll bar to zoom in and
out. Amazing!:
http://htwins.net/scale2/
There are a million ways to say, "I Love You." Here are some of Hollywood's
greatest declarations of love compiled from 95 famous movies:
http://www.flixxy.com/how-hollywood-says-i-love-you.htm
15 cool, incredibly tiny tech gadgets for your keychain:
http://www.infoworld.com/slideshow/30933/15-cool-incredibly-tiny-tech-gadgets-your-keychain-186114?
The most breathtaking landscapes and authentic experiences across Alberta, Canada:
http://www.flixxy.com/travel-alberta-canada.htm
An 'Inception' roller coaster dream, filmed in Buenos Aires - uplifting in many ways ;)!
http://www.flixxy.com/buenos-aires-inception-park.htm
Thijme Termaat from Holland is an amazingly talented painter and videographer:
http://www.flixxy.com/i-paint.htm
Time lapse of Manhattan, using the 'tilt shift' technique, which creates a 'miniature effect':
http://www.flixxy.com/new-york-time-lapse-tilt-shift.htm