While the technical side of cybersecurity, such as firewalls and threat detection services, helps contain various attacks, it’s the human side that poses the most risk. Social engineers know how to manipulate emotions and use them against the victim. Cons and scams work because humans will always have vulnerabilities that cannot be patched by a software update. This edition ends the year by showcasing real-world examples of social engineering attacks and how they can be prevented.
Security threats come from everywhere. Detecting those threats before they cause damage is paramount to an organization’s success. Even though some threat detections require technical skills, the ultimate threat detection is you--the human firewall. This month’s newsletter addresses the who, what, and why of enterprise threat detection and highlights two major threats: BEC and ransomware
Being a human firewall is more than just not clicking on obvious phishing links; it’s a lifestyle choice that improves overall security no matter where you go or what you do. This issue examines the five traits that human firewalls exhibit in their personal and professional lives, as well as seven tools that every human firewall can keep in their metaphorical utility belt. We spend a bit more time looking at the importance of incident reporting and the types of security events that you need to report.
Cybercrime is something that impacts everyone, both professionally and personally. At work, a data breach could permanently damage an organization’s reputation and result in lawsuits and fines. On an individual level, when our sensitive info ends up in the wrong hands, it could lead to identify theft and additional cyber-attacks. This month’s newsletter identifies how data breaches happen, their impact on us personally, and what we can do to prevent cybercrime at work, at home, and on the go.
We live in a connected world where sensitive data has effectively become currency. As such, understanding how to protect that information has become an imperative part of our daily routines. This month’s newsletter covers the importance of data classification, then dives into what cybercriminals do with stolen data, and wraps up with compliance regulations and their impact on our lives both professionally and personally.
Culture traditionally refers to the shared customs, arts, and other characteristics of specific groups of people. Similarly, the security awareness culture of an organization refers to the shared human effort of information security. Creating a culture of security aware individuals requires the participation of every employee, from executives to the front desk. In this month’s newsletter, we examine the steps that everyone can take to improve culture and put security first in the workplace.
Like automobiles, buildings, and our own bodies, devices require a bit of maintenance. Ignoring simple actions, such as updating apps and deleting/organizing files, not only leads to degraded performance, it also invites security risks. In this edition, we focus on those risks and highlight how they can be avoided both at work and at home.
To build a culture of strong human firewalls, it’s important to prioritize not just organizational security, but personal security as well. That’s why this month’s newsletter takes on a personal focus by covering how to protect your family online, how to secure home networks, and what it means to properly maintain mobile devices. When security receives precedence in all facets of life, both organizations and individuals improve their resistance to cybercrime.
How do you prevent data breaches at work? What do you do if your personal data is involved in a breach? Is it possible to maintain privacy in a constantly connected world so immersed in technology? In this issue, we address these questions and uncover solutions for maintaining security at work, at home, and on the go. It begins with a field guide to PII, continues with five steps for preventing identity theft, and ends by identifying the most common causes of data breaches—all while highlighting the non-technical, human side of protecting data!
Security doesn’t require a robust understanding of networks and computers. Most of it comes down to non-technical actions and using common sense! In this edition, we jump into the simple side of security with a quick overview of what it means to use non-technical security awareness, and why it’s important to separate your professional life from your private life (such as with BYOD, or bring your own device). We wrap things up in the physical world by highlighting a few real-life examples of physical security events.
Comprehensive Guide to Security Awareness: Kick the year off with a comprehensive overview of how to prioritize security awareness in your life, both personally and professionally. This guide digs into the specifics of what it means to be a strong human firewall, and why we place so much value on things like strong password practices and following policy.
Today, mobile refers to a massive web of connected devices (the Internet of Things, or IoT). It isn’t about simply having access while on-the-go. It’s about having control of nearly everything from the convenience of a smart device that fits in your pocket or straps to your wrist. Unfortunately, lost in this world of smart connections is the prioritization of security. New technology rarely comes stocked with features that improve resistance to cybercrime. Quite the opposite, in fact.