Security Awareness Training Blog

Security Awareness Training Blog

Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.

If The Cops Can Get Hacked, Then So Can Your Organization

[caption id="attachment_1242" align="alignleft" width="300" caption="Cops Get Hacked"][/caption] Anonymous continued its cyber-attacks against law enforcement agencies to protest recent ...
Continue Reading

We Need Some Real Cybercrime Fighters!

[caption id="attachment_1234" align="alignleft" width="300" caption="cybercrime fighters"][/caption] The international community has failed to address the real nature and extent of the ...
Continue Reading

Cybercrime and Espionage

[caption id="attachment_1225" align="alignleft" width="300" caption="Shadowy Espionage"][/caption] The world's most extensive case of cybercrime-espionage, including attacks on U.S. ...
Continue Reading

The Changing Face of Cybercrime

Once upon a time being the victim of theft meant that someone picked your pocket, grabbed your purse and ran, or robbed your home. They were there and then gone, along with your ...
Continue Reading

Cybercrime – a growing expense for all organizations

[caption id="attachment_1203" align="alignleft" width="300" caption="Cybercrime Costs Rising"][/caption] Cybercrime cost corporations 56 percent more this year than last, according to an ...
Continue Reading

Protecting Your Organization from Cybercrime

[caption id="attachment_1162" align="alignleft" width="200" caption="orangized cybercrime"][/caption] Following is an excerpt from an article by Rockie Brockway, Security Practice ...
Continue Reading

A True Story of Organized Cybercrime

[caption id="attachment_1156" align="alignleft" width="300" caption="Hackerville, Romania"][/caption] Following is an excerpt from a fascinating but very scary story that affects s all of ...
Continue Reading

June was a Busy Month for Cybercriminals

[caption id="attachment_1150" align="alignleft" width="192" caption="cybercriminals"][/caption] Last month Russian cybercriminals tried their luck at “making money for nothing” using the ...
Continue Reading

Five Generations of Cybercrime

It helps to understand more about the history of hacking, when you need to defend yourself or your organization against cybercrime.
Continue Reading

Federal Law Overhaul Needed to Fight Today’s Cybercrime

[caption id="attachment_1132" align="alignleft" width="300" caption="Congressional Law Makers"][/caption] In mid-May, the Obama administration called on Congress to expand the definition ...
Continue Reading

Today’s Organizational Cyber Security Challenge

[caption id="attachment_1126" align="alignleft" width="160" caption="cyber security"][/caption] The most challenging cybercrime attacks exploit human vulnerabilities rather than ...
Continue Reading

Ohio’s Cybercrime Woes

A look at cyberheists and other cybercrimes in Ohio recently shows more than 25,000 private records from school districts, hospitals, retirement benefits firms and others have been ...
Continue Reading

Cybercrime Statistics are Bad, But No one Agrees How Bad…

[caption id="attachment_1115" align="alignleft" width="300" caption="cybercrime statistical chart"][/caption] The news media, the government, and countless Internet security organizations ...
Continue Reading

National and Local Government Debate Cybercrime Issues

From the White House to Congress, federal leaders are looking at a range of policy options to bolster the United States’ ability to thwart Internet threats ranging from cybercrime to ...
Continue Reading

FFIEC Updates Internet Banking Environment Guidelines

Federal banking regulators today released a long-awaited supplement to the 2005 guidelines that describe what banks should be doing to protect e-banking customers from cybercrime, hackers ...
Continue Reading

The World Wide Web is being re-branded as the World Wild Web

[caption id="attachment_1070" align="alignleft" width="300" caption="World Wild Web"][/caption] Increasingly, cyber-criminals are using mobile malware and fake apps as monetizing ...
Continue Reading

Users Are the Weak Link in IT Security!

[caption id="attachment_1060" align="alignleft" width="300" caption="Weak Link in IT Security"][/caption] Firewalls and antivirus software can only go so far. Jeff James of Windows IT ...
Continue Reading

FBI Finally Shuts Down Major Cybercrime Outfit “Coreflood-Botnet”

[caption id="attachment_1054" align="alignleft" width="210" caption="FBI Cybercrime Agent"][/caption] The FBI has scrubbed some 19,000 PCs that were infected with the Coreflood bot ...
Continue Reading

Bank Gets Sued Over $2,000,000 Cyberheist

A judicial decision came down last week from a District Court in Michigan. Experi-Metal fell victim to a major cyberheist and then sued their bank (Comerica) over a nearly $2,000,000 ...
Continue Reading

Cybercrime on the U.S. Senate

On Monday, the U.S. Senate confirmed a branch of its website was breached by a hacker group. U.S. Senate Majority Leader Reid and House Speaker Boehner appear disheartened in photo. It’s ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews