Security Awareness Training Blog

IT Security Blog

Get the most current news about the IT Security industry, what the latest threats are and what that means to security professionals.

Security firms slow to react to spear phishing like that used in China hack

Antone Gonsales at the CSO site hits the nail on the head: "Email security vendors have failed to do enough to protect customers against advanced cyberattacks like the one recently linked ...
Continue Reading

Which Antivirus Has The Best Phishing Protection? Surprise!

I ran across some very interesting research recently done by NSS Labs. They compared twelve of the most popular antivirus engines, they call them endpoint protection products (EPP) and ...
Continue Reading

New CyberSec Executive Order IT Impact Zero

Last Tuesday, the White House issued the long awaited CyberSec Executive Order, which makes an attempt to outline policies that will protect US organizations against cyber-attacks and ...
Continue Reading

Cyber Bullying

KnowBe4 is a market leader in security awareness training for employees in an office environment. However, when we asked people who finished the training what they thought, they said they ...
Continue Reading

Feb SANS Monthly Awareness Video

You may be familiar with our friends at SANS. For their 'Securing The Human' team, every month is security awareness month, same as here at KnowBe4. On the first of every month they post ...
Continue Reading

IT security equals job security

Did you ever expect that our IT networks would be a worldwide battleground for highly sophisticated cyber warfare? IT security certainly will provide job security for the next decade or ...
Continue Reading

DHS disable your Plug And Play

Today, Jan 29 2013, the Department of Homeland Security advises computer users to disable Universal Plug and Play (UPnP), after researchers at Rapid7 alerted DHS that hackers could ...
Continue Reading

Most Common Motivations Behind DDoS Attacks

Arbor networks Worldwide Infrastructure Security Report (WISR) shows that ideology is the primary attack motivation, followed by online gaming and vandalism. Click on the graphic to go to ...
Continue Reading

Fake Apple Invoices

Internet criminals are getting more and more inventive with their social engineering attacks. Here are two examples of fake Apple invoices. The first is an example from the Sophos blog ...
Continue Reading

Upper Management Often Ignores IT Security Policy

Over the years I have had a nagging suspicion that only today was confirmed. I ran into a study done last year done by a company called Cryptzone who interviewed 300 IT Security ...
Continue Reading

Facebook Graph Search Is Social Engineering Bonanza

Zuck has come out with something new, and you always need to watch it when that happens. It's a combination of big data and social networking so that people can easily find new friends, ...
Continue Reading

Healthcare Security Awareness Training

KnowBe4 and it's CEO Stu Sjouwerman (pronounced shower-man) were featured in For The Record Magazine, a leading publication for Healthcare. The article was about the risks of Bring Your ...
Continue Reading

Deloitte Study shows 88 percent thinks they are cyber threat safe

Oh my. Deloite UK did a bunch of interviews with small and medium organizations which showed that a whopping 88% think they are safe and will not be attacked from the outside. Talk about ...
Continue Reading

Thanks For Your Support We Grew 470 percent from 2011 to 2012

[caption id="Stu Sjouwerman" align="alignleft" width="390"]Stu Sjouwerman, Founder and CEO of KnowBe4,LLC [/caption] Thanks for your support! KnowBe4's 2011 to 2012 year-over-year growth ...
Continue Reading

Here Are Your 13 Predictions For 2013

Here Are Your 13 Predictions For 2013 - First Quantity, Now Quality: In 2013, cybercrime will focus more on quality than before. They will opt for increasingly smart malware, and more ...
Continue Reading

Infographic The eternal life of malware

The San Mateo, California based security firm AlienVault created a very interesting infographic that they called “The eternal life of malware.” because the malware gets recycled and ...
Continue Reading

How to Find if a Website Is Legitimate

1) Call, write, or email the website using the contact information provided on their website to check for legitimacy. If you reach an automated voice messaging system, find that the ...
Continue Reading

The Secret Of The Net One Big Buggy Beta

Most people look at me surprised when I tell them the internet is still in beta, but it's true,
Continue Reading

Malware called Eurograbber steals 36 million Euros

If cybercrime would be promoting their malware, for sure they would call their EuroGrabber 'next-generation' Zeus crimeware. This is (a lot) more than your run-of-the-mill banking Trojan. ...
Continue Reading

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews