Security Awareness Training Blog

Compliance Blog

Compliance news as it relates to cybersecurity, who it affects, and how to stay compliant.

Federal Contractor? Insider Threat Training Deadline June 1- Don't Lose Your Clearance

Insider Threat Training Requirement for US Gov't Contractors (Deadline May 31, 2017) SANS just alerted US federal contractors that wish to maintain their clearances must have completed an ...
Continue Reading

Cybersecurity Top Risk Consideration In Board Room

The Wall Street Journal polled its readers and asked them to rate the top compliance issues of 2014. The answers were very interesting!
Continue Reading

PCI Publishes Guidance On Security Awareness Training

The Payment Card Industry Council thinks Security Awareness Training is so important that they just published a 25-page guidance paper that fully explains the why, how and what of ...
Continue Reading

NISTs New Approach to Cybersecurity Standards

Applying Engineering Values to IT Security. The National Institute of Standards and Technology is developing new cybersecurity standards based on the same principles engineers use to ...
Continue Reading

80% Fail To Maintain PCI Compliance Between Assessments

OUCH. Verizon said in a report this month that nearly 80% of organizations that achieve annual compliance with the PCI Data Security Standard -fail- to maintain that status after passing ...
Continue Reading

Dont Let Your C-Level Execs Wind Up At Capitol Hill Like This

Major U.S. retailers at Senate hearing: hackers have upper hand
Continue Reading

INFOGRAPHI​C: The Illusion of Personal Data Security in E-Commerce

Dashlane’s first quarterly Personal Data Security Roundup was released recently. The roundup takes a look at password policies of the top 100 e-commerce sites, and the results are ...
Continue Reading

Do You Automate Sending SMS/Text Messages For Marketing?

My friend Chip Cooper at digicontracts sent me this, and I think it's a good heads up for all of you. There is a common misconception that text/SMS messages are subject to the same ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews