Security Awareness Training Blog

IT Security Blog

Get the most current news about the IT Security industry, what the latest threats are and what that means to security professionals.

[On-demand Webinar] 5 IT Security Myths Your CISO Believes are True… BUSTED!

Facts are facts… but what happens when IT security pros take myths at face value? That got us thinking… what if we whip out our magnifying glasses, pull out the trench coats and use our ...
Continue Reading

Yes, Google's Security Key Is Hackable

Here is an article by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4 Ever since Google told the world that none of its 85,000 employees had been successfully hacked since they ...
Continue Reading

[On-Demand Webinar] What Most Computer Security Defenses Are Doing Wrong and How to Fix It

Most companies have huge gaps in their computer security defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”. But it ...
Continue Reading

IT Security in the enterprise: Things are looking up!

Cybersecurity is quickly becoming the number one business priority, says identity and access management company Okta. Based on the results of an analysis of authentication and ...
Continue Reading

New Survey: IT Security Spending Is Up, But Security Is Not, Ransomware Is The Biggest Worry

The second-annual Cyren-Osterman Research U.S. security survey shows a significant disconnect between rising IT security spending and a low level of confidence in current protection, ...
Continue Reading

ITIC / CyberheistNews Top 10 IT Security Recommendations May 2017

By Laura DiDio There is no such thing as a 100% fully secure environment. And there never will be. Security is not static; it is an ongoing work in progress. Organizations must be ...
Continue Reading

Who Is Learning How to Take Down the Internet?

It was all over the news. A sustained DDoS attack that caused outages for a large number of Web sites Friday was launched with the help of hacked “Internet of Things” (IoT) devices. Jeff ...
Continue Reading

Researchers discover new malicious IoT worm

Researchers at RapidityNetworks discovered a new malicious worm using Telnet that infects IoT devices using their insecure default credentials and uses a peer-to-peer network to install ...
Continue Reading

Is Security Making The Grade? What IT And Business Pros Really Think

Great joint survey by CSO, CIO and ComputerWorld by Amy Bennett which is excelllent ammo to add to a budget request that needs to be approved by a C-level exec. Here's why: "If you sense ...
Continue Reading

IT Security Is A Protoscience, Think 19th Century Chemistry

So I get the Andreessen Horowitz newsletter. It has a topic called "Security is a protoscience (and more on 'so you want to work in security') - Michal Zalewski" I'm intrigued so I click ...
Continue Reading

Why does Kevin Mitnick recommend 20+ character passwords?

The background is based on current state-of-the-art password cracking technology. In short, hackers penetrate the network, get access to a domain controller and pull the file with all ...
Continue Reading

Personal security cameras hacked, stream live on websites

Shocking video of people's private lives are streaming over the internet. Hackers are able to easily tap into personal security cameras and stream them on websites for the world to see, ...
Continue Reading

New Study Shows Your Apps Could Be Putting Your Personal Information At Risk

A recent study by Cloudlock, a cyber security company, revealed several popular apps that could allow hackers an easy gateway to access your personal information.
Continue Reading

Intel Thinks Antivirus Is Shit And Dumps Useless McAfee

Remember that in a gray past, Intel had an antivirus product called Intel LanDesk Virus Protect? Well, that Intel LanDesk Virus Protect got acquired by Symantec in 1998, and Intel must ...
Continue Reading

New KnowBe4 Survey: Ransomware Infections Double In Two Years

We have just released the first long-time study focusing on IT Pros experience with ransomware. In June 2016 we surveyed 1,138 companies in a variety of industries and compared your ...
Continue Reading

InfoSec Analyst: "We Make People Suck At IT Security"

IT Security analyst Ben Tomhave calls himself an infosec obsessive and I admire his insightful analyses when they appear. This time he commented on the recent attacks that followed the ...
Continue Reading

New KnowBe4 Feature: Vulnerable Browser Plugin Detection

How Can I See If My Users Have Vulnerable Browser Plugins Installed? Within your console, you can automatically detect what vulnerable plugins any clickers on your phishing tests have ...
Continue Reading

Users Really Do Plug in USB Drives They Find

Been suspecting that your users are plugging in any USB stick they find, to see what is on it? Well, you are right, they actually do that. Fresh scientific research by Google, and the ...
Continue Reading

InfoSec World 2016 Conference & Expo

Responsible for IT Security?
Continue Reading

TeamViewer Denies It Is Surprise Ransomware Infection Vector

A modified version of EDA2, an open source ransomware strain developed by Turkish computer engineering student Utku Sen, --by the way, thanks Utku, that was a very smart idea-- has been ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews