Can emerging free metrics put a finer point on security training success?
Demonstrating success in the information security field is tough — really tough. There are very few quantifiable success metrics. how, for example, do you quantify that your firewall or AV is working?...
View ArticleTake 3 Minutes & Watch This Good Phishing Explanation Video by SecurityMetrics
This is video by SecurityMetrics is a straightforward explanation of phishing and the risks it poses to your organization. We really appreciate their emphasizing the importance of effective employee...
View ArticleThe Phishing Defense One-Two Preparation: Prevention is Priority, but Be...
I read a great article from SecurityWeek a few days ago. Author Jon-Louis Heimerl emphasized what we think is the most essential aspect of any phishing prevention strategy: preparation for any attack...
View ArticleSpear Phishing Becoming the Go-To Cyber Attack Strategy
TrendMicro’s latest research paper serves up some pretty convincing evidence that phishing, and spear phishing in particular, is the preferred hacker attack strategy. According to the data, more than...
View ArticleHow do you start 2013 out on a smart, secure path?
2012 was the year phishing hit peak levels — hopefully enough to get more organizations serious about training their employees on how to avoid getting compromised. How many times did we read about...
View ArticleFighting cybercrime for real? You CAN’T rely on single security control.
Cyber-Attacks on Infrastructure Firms Highlight Need for New Defenses – That’s the title of an article by Robert Lemos posted on eWeek a couple days ago, and every clear-thinking security professional...
View ArticleSpear Phishing — who’s getting caught?
Here’s an excellent info graphic summarizing the industries and rate of spear phishing attacks. Very nice work by Firmex on putting together various sources. This is perfect justification for why you...
View ArticleEnd Users Are Powerful Security Tools
Here’s another great blog from Ben Ten who is great about sharing how he is training end users to help defend against attacks. This post describes how his end users recently observed people trying to...
View Article
More Pages to Explore .....