By focusing on meaningful security metrics, organisations can benchmark, assess progress, and measure with a view to reducing the risk inherent in the human aspect of cyber security.
Download this white paper and learn:
Why metrics are so important;
What makes a metrics "meaningful";
How to use meaningful...
It’s clear, and it has been for a long time, that traditional tickbox security awareness training efforts aren’t working. And they’re not working because they make little or no effort to change people’s behaviour.
To reduce human cyber risk, security awareness training must go beyond raising awareness and...
CybSafe’s analysis of ICO data finds the number of incidents of ransomware reported has doubled in a year. What action can leaders make to reduce their risk of falling victim to attacks?
Download this white paper and learn:
Why ransomware is on the rise;
How phishing works as the on-ramp to ransomware;
How...
If the process of building a cohesive security plan seems daunting, or there just isn’t enough time, expertise or resources to complete the project yourself, help is here for building, maintaining and continuously evolving your cybersecurity program to meet current and future challenges.
Download this whitepaper...
Roger Lang, who has experience in SaaS and fintech and has invested in various cybersecurity companies, says that education is the key to making real progress on cybersecurity issues.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
The U.K. Cyber Security Council is a new self-regulatory body for the profession. It is tasked by the U.K. government to execute its vision for the U.K. to be one of the safest places to work and do business online, says the chair of the council’s board of trustees, Dr. Claudia Natanson.
The day-to-day pressures of being a CISO are enormous and extend to matters far beyond those of incident response time. Meanwhile, traditional approaches to training cybersecurity team members have either been limited by scalability, lack of hands-on learning, or cost.
So, how much can Simulation-based Cybersecurity...
In theory, organizations are best protected by a layered security approach to cybersecurity based on best-in-class security tools.
In reality, the desired outcome is rarely achieved.
Why? Because most teams are not fully trained to use the technology on which their security program is built.
Download this...
How can the security and HR organizations partner to foster a better, enterprisewide culture of security? This is what Steve Luczynski and Valerie Utsey did in previous roles, and they share insights from their presentation on the topic at RSA Conference 2021.
'Mega breaches' might sound dystopian, but they're becoming an all too familiar feature of the modern cyber crisis. Yet organizations are still relying on traditional techniques to prepare and exercise their workforces' cyber crisis response. Enter micro-drilling: the modern alternative to tabletop exercising.
In...
Cybersecurity training: from dry-as-dust videos to cutesy animations of hapless office workers to streams of green code on a black screen. The variety out there is staggering, and it’s hard to know where to start – or what's really going to work.
Luckily, the most effective forms of training – for all teams,...
Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking...
What really makes a "strong" password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?
For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries'...
Motivation, retention, and support are the crucial components of every successful security awareness training program. After you’ve got your program in place and it’s optimized to motivate adult learners, you can start to focus on improving the ‘stickiness’ of your program by focusing on improving your...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.