Security Awareness Training Blog

Security Awareness Training Blog

Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.

If You Think Security Awareness Training is Expensive, Try Ignorance

Facts surrounding spear phishing all point to employees as the most cited culprits and security awareness training as the most effective remedy. Yet all training programs are not equal. ...
Continue Reading

So, What Is The Real Reason The White House Got Hacked?

According to a new CyberEdge research survey of 19 sectors, including government, spearphishing is the biggest concern to IT security pros, more worrisome than even malware. And only 20 ...
Continue Reading

SHOCKER: Data Breaches Cost Big Companies Very Little

Two articles today in Fortune Magazine and Harvard Business Review each lifted a piece of the veil about a dirty little secret about data breaches. From Home Depot to Target to Sony, big ...
Continue Reading

IBM: 'Dyre Wolf' Cyber Gang Uses Spear Phishing For $1 Million Cyberheists

Last week, IBM Security reported on an active cyberheist campaign using a variant of the Dyre Trojan that has successfully stolen more than $1 million at a time from targeted enterprise ...
Continue Reading

Experts: Social Engineering Attacks Harder To Stop

Michael Heller at TechTarget wrote a good longish article where he concluded: "As more personal and corporate information is shared on the Web, social engineering techniques and attacks ...
Continue Reading

How to get your Phish-prone percentage up. Up? Yes, Up.

Something surprising happened last week. A few of our customers reported that their phish-prone percentage was going up. Up? Yes, up. Not something you normally would expect or ...
Continue Reading

Premera And Anthem Both Hacked Using Shrewd Social Engineering

Health records are the new credit cards. They have a longer shelf life and are often easier to get. There are more opportunities for fraud. No wonder that bad guys are after them with a ...
Continue Reading

Why your brain shuts down when you see a security alert

Been mystified why end-users do not seem to get it? Their eyes glazing over when a security alert pops up on their screen? Brand new neuroscience research using MRI shows a dramatic drop ...
Continue Reading

Despite Mobile App Risks Enterprise Does Not Have Mobile Security Policy

Here is the disconnect: 82 percent of IT pros think that BYOD in the workplace has “very significantly” or “significantly” increased IT security risks, less than half of organizations ...
Continue Reading

CyberheistNews Vol 5 #11 Ransomware: Pay Up Or Fight. What Would You Do?

Ransomware: Pay Up Or Fight. What Would You Do? Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade ...
Continue Reading

Report: 71 percent successfully spear-phished in 2014

Adam Greenberg at SC Magazine reported on something interesting:
Continue Reading

Spear Phishing Attack Nearly Costs FL City $500K

A spear-phishing last month at Orange Park City Hall almost got away with $500,000 from the city's bank account. Fortunately it was caught in time so that a wire transfer that already had ...
Continue Reading

Number One Infosec Headache Is End Users

Continue Reading

Intel Report About Social Engineering

In a new report, Hacking the Human OS, McAfee (owned by Intel) security researchers Raj Samani and Charles McFarland found that, increasingly, hackers are using social engineering ...
Continue Reading

More Phishing Attacks Going After Financial Data

Kaspersky recently reported that 28.8 percent of phishing attacks in 2014 tried to steal financial data from consumers. The results show how cybercrime has shifted its focus to payment ...
Continue Reading

World's Biggest Cyberheist Cybergang Phished $900 Million Out Of Banks

More than 100 financial institutions in 30 countries have been the victim of a cyberheist that lasted in some cases almost 2 years. This was not a smash-and-grab but a highly ...
Continue Reading

Antivirus Products Are Slow at Making Malware Signatures

The traditional malicious software detection approach is far from being sufficient, especially in corporate environments. More and more it's found that antivirus products can take months ...
Continue Reading

Anthem Breach Began with Phishing of Employees

Last updated 2/12/2015 - The foreign hackers who stole up to 80 million records from Anthem social engineered their way into the company's network by obtaining the credentials of five ...
Continue Reading

Train Employees And Cut Cyber Risks Up To 70 Percent

It's a well-known fact that employees are the weakest link in IT security. There is good news though! New research from our friends at Wombat Security Technologies and the Aberdeen Group ...
Continue Reading

Defense In Depth: Your Answer To Social Engineering

Organizations defend their networks on each of the six levels in the green graph you see. End-user Internet Security Awareness Training resides in the outer layer: ‘Policies, Procedures, ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews