“While we’re seeing the number of attacks trending higher, we are also experiencing more rigorous reporting of cyber breaches and the uncovering of attacks that happened several years ago” says Dr. Hend Ezzeddine, PhD, Cyber Security Practice Director at Expressworks International. While the number of companies adopting the latest [...]
Gamification is an engaging way to motivate security operations center analysts to develop their incident response skills and situational awareness.
Ransomware is a type of malware or software program designed to lockup a device that is connected to the Internet, limiting access to the device and/or data in demand for a ransom. It has been around for over a decade now and cyber criminals have used that time to incorporate [...]
To successfully fight threats across industries, we must all use the same terminology.Read the full article at: www.darkreading.com "We must continue to strive toward establishing a common global cybersecurity language that spans government, industry, and academia: this is our center of gravity. Until we make progress, this is a deficiency that will remain a vulnerability that our common adversaries exploit to outpace and outmaneuver us. " People are an often overlooked line of defense in any cyber security strategy. If users aren't clear about what they're supposed to do or don't understand what you are trying to tell them, even the best technology will not help. Human behavior, being what it is, is greatly helped by using simple and unambiguous language. So a word to the wise, if you're a cyber security expert, make your language plain and free of jargon if you're trying to enlist people in your fight against cyber crime. Contact us if you need help with human behavior in your cyber security programs.
The biggest hacks, data exposures, and thefts that left companies and government entities reeling.Read the full article at: www.darkreading.com A list of security breaches? Why not? People like lists. It happens every year, at the end or the beginning. Some are lists of things to do for the next year. Some are lists about the previous year -- like the 2016 best or worst songs, novels or movies. There’s a list of the world’s richest people, the most expensive universities, the cheapest cars and even a list of the largest government technology contracts. Bucket lists, most wanted lists, wish lists, Santa lists. And the list goes on. So, here is a list of the most sensational security breaches for 2016. From emails to bank accounts. From the IRS to Yahoo. From Illinois and Arizona Boards of Election to the San Francisco Municipal Transportation Agency. Data exposed, money stolen, CEO’s fired, people harmed, and, possibly, presidential elections lost. Breaches happen all over the world to all types of businesses, agencies and individuals. No one is immune. Nothing is off limits. We must be diligent and make it our responsibility to actively safeguard our personal and business data. The weakest link in a cyber security network might be the human one. Contact us and we can help you understand the risks and help you make cyber security choices that are the right ones for you and your business.
Most people are aware they shouldn't post sensitive and personally identifying information on social media, such as a letter with their address or a plane ticket, as they could be used by scammers.
The concept of “psychology of security” is often a foreign concept to IT professionals, yet they all acknowledge that users are the biggest challenge. When hackers are unsuccessful at exploiting technical vulnerabilities, they turn their attention towards users. They scan for responses to psychological triggers and cognitive patterns that can [...]