Security Awareness Training Blog

IT Security Blog

Get the most current news about the IT Security industry, what the latest threats are and what that means to security professionals.

Lower Your Business Risk with Best Practice Data Privacy Impact Assessments (DPIA's)

Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to ...
Continue Reading

National Cybersecurity Awareness Month is Over... Now What?

As we wrap up the 2019 National Cyber Security Awareness Month (NCSAM), let’s all agree that our work is not done. As a matter of fact, it’s far from being done. If we are really honest ...
Continue Reading

What Reese’s Peanut Butter Cups Can Teach Us About Phishing

One of the greatest inventions in modern history is the Reese’s Peanut Butter Cup. I feel sorry for any human who existed before the “age of the cup” because they never got to know the ...
Continue Reading

A Former CIA Officer Shows You How to Make Your Organization a Hard Target

Having spent over a decade as part of the CIA’s Center for Cyber Intelligence and the Counterterrorism Mission Center, Rosa Smothers knows the ins and outs of leading cyber operations ...
Continue Reading

I Can Phish Anyone

I’m a bit surprised by some aggressive corporate anti-phishing policies which say they will fire anyone for one accidental phishing offense. Send me the names and email addresses of the ...
Continue Reading

Brand-New: Multi-Factor Authentication Security Assessment Tool Helps Assess Your Organization's MFA Vulnerabilities

You already know that using multi-factor authentication (MFA) can decrease your cybersecurity risk, and certainly is a much stronger defense compared to using traditional passwords alone. ...
Continue Reading

Here Are Some Interesting Headlines I Found During Black Hat

Black Hat 2019 - The Craziest, Most Terrifying Things We Saw: I ran into Neil Rubenking when I went to the Qualys party which was in the Foundation Room all the way on top of the ...
Continue Reading

[On-demand Webinar] Top 5 IT Security Myths Your CISO Believes are True… BUSTED!

Facts are facts… but what happens when IT security pros take myths at face value? That got us thinking… what if we whip out our magnifying glasses, pull out the trench coats and use our ...
Continue Reading

Yes, Google's Security Key Is Hackable

Here is an article by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4 Ever since Google told the world that none of its 85,000 employees had been successfully hacked since they ...
Continue Reading

[On-Demand Webinar] What Most Computer Security Defenses Are Doing Wrong and How to Fix It

Most companies have huge gaps in their computer security defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”. But it ...
Continue Reading

IT Security in the enterprise: Things are looking up!

Cybersecurity is quickly becoming the number one business priority, says identity and access management company Okta. Based on the results of an analysis of authentication and ...
Continue Reading

New Survey: IT Security Spending Is Up, But Security Is Not, Ransomware Is The Biggest Worry

The second-annual Cyren-Osterman Research U.S. security survey shows a significant disconnect between rising IT security spending and a low level of confidence in current protection, ...
Continue Reading

ITIC / CyberheistNews Top 10 IT Security Recommendations May 2017

By Laura DiDio There is no such thing as a 100% fully secure environment. And there never will be. Security is not static; it is an ongoing work in progress. Organizations must be ...
Continue Reading

Who Is Learning How to Take Down the Internet?

It was all over the news. A sustained DDoS attack that caused outages for a large number of Web sites Friday was launched with the help of hacked “Internet of Things” (IoT) devices. Jeff ...
Continue Reading

Researchers discover new malicious IoT worm

Researchers at RapidityNetworks discovered a new malicious worm using Telnet that infects IoT devices using their insecure default credentials and uses a peer-to-peer network to install ...
Continue Reading

Is Security Making The Grade? What IT And Business Pros Really Think

Great joint survey by CSO, CIO and ComputerWorld by Amy Bennett which is excelllent ammo to add to a budget request that needs to be approved by a C-level exec. Here's why: "If you sense ...
Continue Reading

IT Security Is A Protoscience, Think 19th Century Chemistry

So I get the Andreessen Horowitz newsletter. It has a topic called "Security is a protoscience (and more on 'so you want to work in security') - Michal Zalewski" I'm intrigued so I click ...
Continue Reading

Why does Kevin Mitnick recommend 20+ character passwords?

The background is based on current state-of-the-art password cracking technology. In short, hackers penetrate the network, get access to a domain controller and pull the file with all ...
Continue Reading

Personal security cameras hacked, stream live on websites

Shocking video of people's private lives are streaming over the internet. Hackers are able to easily tap into personal security cameras and stream them on websites for the world to see, ...
Continue Reading

New Study Shows Your Apps Could Be Putting Your Personal Information At Risk

A recent study by Cloudlock, a cyber security company, revealed several popular apps that could allow hackers an easy gateway to access your personal information. 
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews