Human Risk Management Blog

IT Security

Get the most current news about the IT Security industry, what the latest threats are and what that means to security professionals.

Security firms slow to react to spear phishing like that used in China hack

Antone Gonsales at the CSO site hits the nail on the head: "Email security vendors have failed to do enough to protect customers against advanced cyberattacks like the one recently linked ...

Which Antivirus Has The Best Phishing Protection? Surprise!

I ran across some very interesting research recently done by NSS Labs. They compared twelve of the most popular antivirus engines, they call them endpoint protection products (EPP) and ...

New CyberSec Executive Order IT Impact Zero

Last Tuesday, the White House issued the long awaited CyberSec Executive Order, which makes an attempt to outline policies that will protect US organizations against cyber-attacks and ...

Cyber Bullying

KnowBe4 is a market leader in security awareness training for employees in an office environment. However, when we asked people who finished the training what they thought, they said they ...

Feb SANS Monthly Awareness Video

You may be familiar with our friends at SANS. For their 'Securing The Human' team, every month is security awareness month, same as here at KnowBe4. On the first of every month they post ...

IT security equals job security

Did you ever expect that our IT networks would be a worldwide battleground for highly sophisticated cyber warfare? IT security certainly will provide job security for the next decade or ...

DHS disable your Plug And Play

Today, Jan 29 2013, the Department of Homeland Security advises computer users to disable Universal Plug and Play (UPnP), after researchers at Rapid7 alerted DHS that hackers could ...

Most Common Motivations Behind DDoS Attacks

Arbor networks Worldwide Infrastructure Security Report (WISR) shows that ideology is the primary attack motivation, followed by online gaming and vandalism. Click on the graphic to go to ...

Fake Apple Invoices

Internet criminals are getting more and more inventive with their social engineering attacks. Here are two examples of fake Apple invoices. The first is an example from the Sophos blog ...

Upper Management Often Ignores IT Security Policy

Over the years I have had a nagging suspicion that only today was confirmed. I ran into a study done last year done by a company called Cryptzone who interviewed 300 IT Security ...

Facebook Graph Search Is Social Engineering Bonanza

Zuck has come out with something new, and you always need to watch it when that happens. It's a combination of big data and social networking so that people can easily find new friends, ...

Healthcare Security Awareness Training

KnowBe4 and it's CEO Stu Sjouwerman (pronounced shower-man) were featured in For The Record Magazine, a leading publication for Healthcare. The article was about the risks of Bring Your ...

Deloitte Study shows 88 percent thinks they are cyber threat safe

Oh my. Deloite UK did a bunch of interviews with small and medium organizations which showed that a whopping 88% think they are safe and will not be attacked from the outside. Talk about ...

Thanks For Your Support We Grew 470 percent from 2011 to 2012

[caption id="Stu Sjouwerman" align="alignleft" width="390"]Stu Sjouwerman, Founder and CEO of KnowBe4,LLC [/caption] Thanks for your support! KnowBe4's 2011 to 2012 year-over-year growth ...

Here Are Your 13 Predictions For 2013

Here Are Your 13 Predictions For 2013 - First Quantity, Now Quality: In 2013, cybercrime will focus more on quality than before. They will opt for increasingly smart malware, and more ...

Infographic The eternal life of malware

The San Mateo, California based security firm AlienVault created a very interesting infographic that they called “The eternal life of malware.” because the malware gets recycled and ...

How to Find if a Website Is Legitimate

1) Call, write, or email the website using the contact information provided on their website to check for legitimacy. If you reach an automated voice messaging system, find that the ...

The Secret Of The Net One Big Buggy Beta

Most people look at me surprised when I tell them the internet is still in beta, but it's true,

Malware called Eurograbber steals 36 million Euros

If cybercrime would be promoting their malware, for sure they would call their EuroGrabber 'next-generation' Zeus crimeware. This is (a lot) more than your run-of-the-mill banking Trojan. ...

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.