Security Awareness Training Blog

Cybersecurity Blog

Get the latest news in cybersecurity with in-depth coverage and analysis of current statiistics, developments and how to stay ahead of current threats.

60% of Organizations are Hit by Cyberattacks Spread by Their Own Employees

The unwitting participant appears to be alive and well, based on new data from security vendor Mimecast. With employees being the source of attack surface expansion, what’s an org to do?
Continue Reading

Human Performance as a Risk Factor

Most organizations don’t place enough focus on the human elements of cybersecurity, according to Stephen A. Wilson, Dean Hamilton, and Scott Stallbaum from consulting firm Wilson Perumal ...
Continue Reading

Nearly Every Organization is More Concerned about Cybersecurity Than Before COVID-19

New data from security vendor Tripwire highlights how the shift to remote working has changed the face of cybersecurity for both the current work climate and the future.
Continue Reading

The Three Pillars of the Three Computer Security Pillars

Much of the world, or at least the United States, is coalescing around the NIST Cybersecurity Framework. It’s a pretty good one to follow out of the many dozens that have been proposed ...
Continue Reading

The Best and First Defenses You Should Implement

Every good defense has three pillars of controls: policy, technical, and education. People are always asking what they should do for each to minimize cybersecurity events the most and ...
Continue Reading

See me On-Demand at the WSJ Pro Webinar: Covid-19 Themed Cybercrime

On the latest WSJ Pro webinar Rob Sloan, Research Director, WSJ Pro at Dow Jones was  joined by CEO of TruSTAR Patrick Coughlin who discussed tracking all of the Covid-19 themed ...
Continue Reading

See me at the WSJ Pro Webinar - Wednesday 22nd April. 1pm ET / 10am PT.

On the latest WSJ Pro webinar Rob Sloan, Research Director, WSJ Pro at Dow Jones will  be joined by CEO of TruSTAR Patrick Coughlin who will discuss tracking all of the Covid-19 themed ...
Continue Reading

Removing Zoom Meeting ID's: Treating the Symptom, Not the Cause

Zoom has been under a lot of scrutiny lately, and it's commendable that the vendor has been working through as many security issues as it has. With great growth and visibility comes great ...
Continue Reading

3 Lessons COVID-19 Can Teach Us About Cybersecurity

It’s day 4,823 that I’ve been home for the stay at home order in the county where I live. Okay, so it feels like years, but it’s actually only been a few weeks. Like many of you, I can’t ...
Continue Reading

[On-Demand Webinar] The Art of Invisibility: Important New Privacy Concerns for Your Quickly Evolving Remote Workforce

Corporate privacy concerns are more paramount right now than ever before. Organizations are being forced to maneuver a new world of security and privacy issues related to a remote ...
Continue Reading

Zoom's Recent Hypergrowth Challenges -- And How To Use It In A Secure Way

The massive uptick in use of the popular video conferencing service Zoom has resulted in a rise in stock price, a class action lawsuit, and a huge opportunity for cybercriminals.
Continue Reading

Seven Tips to Optimize Security

Data breaches continue, phishing attacks are on the rise, and people responsible for security wake up in a cold sweat a few times a year worried they’re the next victims.
Continue Reading

Can You Be Spoofed? Find Out For a Chance to WIN a $500 Amazon Gift Card

Will you get spoofed by the Bad Guys?
Continue Reading

The Best Computer Security Solvers Look Beyond the Problem

Who doesn’t love a good computer security “cowboy”? That’s a man or a woman who is a recognized authority in their field of expertise, who groks their subject, who is truly a subject ...
Continue Reading

The Paradox of Perfection

One of the challenges with living in a hyper-connected world is that it’s easy for anyone to stand on a soapbox and point out when something is wrong.
Continue Reading

Every Computer Defense Has Three Main Pillars

Defense-in-Depth is a dogmatic term used in the computer defense industry to indicate that every computer defense has to be made up of multiple, overlapping defenses positioned to best ...
Continue Reading

Reinforcing Security Norms During the Coronavirus Crisis

This blog was co-written by Joanna Huisman and Aimee Laycock. We have all seen an increase in the amount of advice and guidance from the healthcare sector and others since the start of ...
Continue Reading

Critical Considerations to Improve Your Remote Employee Security During the COVID-19 Pandemic

Quickly evolving travel and social requirements in response to COVID-19 mean that, like it or not, many organizations like yours are asking traditional office-based employees to work from ...
Continue Reading

The Most Important Thing When Working From Home

With social distancing being the new norm, introverts are joking about how they’ve been preparing for this moment their entire lives. While working from home has many benefits, doing it ...
Continue Reading

KnowBe4 Named a Leader in The Forrester Wave for Security Awareness and Training Solutions

We have some great news to share with our customers and global security professionals alike. KnowBe4 has been named a Leader in The Forrester Wave™ : Security Awareness and Training ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews