Security Awareness Training Blog

Cybersecurity Blog

Get the latest news in cybersecurity with in-depth coverage and analysis of current statiistics, developments and how to stay ahead of current threats.

1 in 3 Employees Rarely or Never Think About Cybersecurity

Eye-opening data around the impact of human error demonstrates how simple user mistakes can compromise your organization’s cybersecurity posture.
Continue Reading

[HEADS UP] Cyber Attack at University of York Steals Personal Information from Staff and Students

In a recent report by the York Press, University of York has launched an investigation after personal information of students and staff was obtained by the bad guys.
Continue Reading

Don't Overlook Policy When Designing Security

There’s no single defense against phishing and other social engineering attacks, according to Kevin O’Brien, CEO and co-founder of email security company GreatHorn. On the CyberWire’s ...
Continue Reading

60% of Organizations are Hit by Cyberattacks Spread by Their Own Employees

The unwitting participant appears to be alive and well, based on new data from security vendor Mimecast. With employees being the source of attack surface expansion, what’s an org to do?
Continue Reading

Human Performance as a Risk Factor

Most organizations don’t place enough focus on the human elements of cybersecurity, according to Stephen A. Wilson, Dean Hamilton, and Scott Stallbaum from consulting firm Wilson Perumal ...
Continue Reading

Nearly Every Organization is More Concerned about Cybersecurity Than Before COVID-19

New data from security vendor Tripwire highlights how the shift to remote working has changed the face of cybersecurity for both the current work climate and the future.
Continue Reading

The Three Pillars of the Three Computer Security Pillars

Much of the world, or at least the United States, is coalescing around the NIST Cybersecurity Framework. It’s a pretty good one to follow out of the many dozens that have been proposed ...
Continue Reading

The Best and First Defenses You Should Implement

Every good defense has three pillars of controls: policy, technical, and education. People are always asking what they should do for each to minimize cybersecurity events the most and ...
Continue Reading

See me On-Demand at the WSJ Pro Webinar: Covid-19 Themed Cybercrime

On the latest WSJ Pro webinar Rob Sloan, Research Director, WSJ Pro at Dow Jones was  joined by CEO of TruSTAR Patrick Coughlin who discussed tracking all of the Covid-19 themed ...
Continue Reading

See me at the WSJ Pro Webinar - Wednesday 22nd April. 1pm ET / 10am PT.

On the latest WSJ Pro webinar Rob Sloan, Research Director, WSJ Pro at Dow Jones will  be joined by CEO of TruSTAR Patrick Coughlin who will discuss tracking all of the Covid-19 themed ...
Continue Reading

Removing Zoom Meeting ID's: Treating the Symptom, Not the Cause

Zoom has been under a lot of scrutiny lately, and it's commendable that the vendor has been working through as many security issues as it has. With great growth and visibility comes great ...
Continue Reading

[On-Demand Webinar] The Art of Invisibility: Important New Privacy Concerns for Your Quickly Evolving Remote Workforce

Corporate privacy concerns are more paramount right now than ever before. Organizations are being forced to maneuver a new world of security and privacy issues related to a remote ...
Continue Reading

3 Lessons COVID-19 Can Teach Us About Cybersecurity

It’s day 4,823 that I’ve been home for the stay at home order in the county where I live. Okay, so it feels like years, but it’s actually only been a few weeks. Like many of you, I can’t ...
Continue Reading

Zoom's Recent Hypergrowth Challenges -- And How To Use It In A Secure Way

The massive uptick in use of the popular video conferencing service Zoom has resulted in a rise in stock price, a class action lawsuit, and a huge opportunity for cybercriminals.
Continue Reading

Seven Tips to Optimize Security

Data breaches continue, phishing attacks are on the rise, and people responsible for security wake up in a cold sweat a few times a year worried they’re the next victims.
Continue Reading

Can You Be Spoofed? Find Out For a Chance to WIN a $500 Amazon Gift Card

Will you get spoofed by the Bad Guys?
Continue Reading

The Best Computer Security Solvers Look Beyond the Problem

Who doesn’t love a good computer security “cowboy”? That’s a man or a woman who is a recognized authority in their field of expertise, who groks their subject, who is truly a subject ...
Continue Reading

The Paradox of Perfection

One of the challenges with living in a hyper-connected world is that it’s easy for anyone to stand on a soapbox and point out when something is wrong.
Continue Reading

Every Computer Defense Has Three Main Pillars

Defense-in-Depth is a dogmatic term used in the computer defense industry to indicate that every computer defense has to be made up of multiple, overlapping defenses positioned to best ...
Continue Reading

Reinforcing Security Norms During the Coronavirus Crisis

This blog was co-written by Joanna Huisman and Aimee Laycock. We have all seen an increase in the amount of advice and guidance from the healthcare sector and others since the start of ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews