Because of the types and volume of data that MTU works with, and because of the risk of financial, reputational, and other harm to MTU and its affiliates due to social engineering and other cyber ...
In the summer of 2021, analyst Gartner published its Market guide for security awareness computer-based training. It reported that the human element (85%) continues to be a primary catalyst for data ...
Rende is the founder & CEO of Rhymetec, a cybersecurity firm providing cybersecurity, compliance and data privacy needs to SaaS companies. In the current high-risk cybersecurity environment, companies ...
Awareness training is great when people can hurt only themselves. But when people can hurt others, stronger measures are required During the recent RSA Conference in San Francisco, I was part of a ...
The omnipresent and ever-increasing digital technology trends of today are quickly and significantly changing our lives. Today’s critical infrastructures, which include nuclear power and other ...
Cybersecurity tech only goes so far, with many attacks targeting human weaknesses. Bad actors trick employees with social engineering ploys and take advantage of human errors, like those leaving ...
Data security is one of those issues that "takes a village" to address—and HR professionals are part of that village. HR can play an important role in helping to ensure that employees have the ...
Cybersecurity awareness training is low-hanging fruit for school districts when it comes to cost-effectively achieving cyber ...
The purpose of this policy is to ensure that all Connecticut College employees and college affiliates with access to college data, are taught Information Security Awareness in order to gain an ...
The shift to digitally networked societies, where daily activities are interlinked with the help of computer-based systems, artificial intelligence (AI) and digital technologies, is having a huge ...
Attackers are increasingly targeting employees to infiltrate organizations. The reason? Employees have direct access to insider systems and data—if threat actors phish just one user and steal their ...
‘Humans are the weakest link’ has been the refrain of the IT security community for many years and, with social engineering attacks becoming ever more prominent and sophisticated, an organisation’s ...