Behavior Change & Training Page 3

Weekly Data Protection & Compliance Links: July 3, 2015

Can you believe it’s July? No, can you believe it’s 2015’s third quarter? Let’s not even talk about where this year is flying off to. Instead, focus on the holiday weekend ahead and some especially good Friday link finds. This week we’re talking about security’s tipping point (did you even know it had one?), hard … Continued

View Resource

50% of Worst Data Breaches Attributed to Human Error

Okay, we admit it. We may have a slight obsession with keeping up on the latest security reports (specifically regarding security awareness). But there’s good reason. Tucked between the data and the charts are patterns of behavior. Identifying these patterns can help us improve our security posture. The 2015 Information Security Breaches Survey commissioned by … Continued

View Resource

Study: Employee Training Reduces the Cost of a Data Breach

As you may have already heard, the Ponemon Institute’s 2015 Global Cost of Data Breach Study has been released and it confirmed what we all sensed—the average cost of a data breach has increased … significantly … again. According the study, the average cost of a breach has reached $3.79 million dollars, a 23% increase … Continued

View Resource

Study: The True Cost of a Data Breach

When you begin to estimate the true cost of a data breach, you most commonly think in terms of dollars and cents. For example, Target’s 2013 data breach reportedly cost the company $186 million; Sony Pictures will spend an estimated $35 million in investigation, remediation, and IT repairs for its hack; Home Depot spent $43 … Continued

View Resource

Chicken or the Egg: Better Software Or Better Training

In this corner, we have folks like Richard Howard. People who believe that when it comes to cybersecurity, we should look past our employees. We can’t expect the average end user to identify a phishing attempt or a suspicious URL, and we certainly shouldn’t blame them (or make fun of them) when they make a … Continued

View Resource

Phishing in 2015: Will We Ever Learn?

We’re starting Monday off with depressing news you probably already know (sorry). It seems the numbers around phishing are not improving (we can hear you groaning from here). There’s equally-depressing data to support our claim. The 2015 CYREN Cyber Threats Yearbook released last month reported a 51% increase in phishing URLs since January 1, 2015. … Continued

View Resource

Is It Your Fault You Were Hacked? (Probably)

One of the most interesting callouts from the 2015 Verizon Data Breach Investigation Report was this: 99.9% of exploited vulnerabilities were compromised more than a year after the common vulnerabilities and exposures (CVE )was published. Let me help you read between the lines – if you were hacked through an already-known, unpatched weak point, the … Continued

View Resource

Spotting the Behavioral Signatures of Odd Ducks

You know the old adage, “if it looks like a duck, walks like a duck, and talks like a duck, it probably is a duck.” However you might feel about such profiling, this is, in a nutshell, the basic idea behind the concept of the behavioral signature. In the context of malware detection, behavioral signatures are an important … Continued

View Resource

Security Awareness by the Numbers—an Infographic

If you’ve been attending IAPP’s Global Privacy Summit 2015 this week, we hope you have been enjoying it. We’re certainly excited to be here! Please visit our booth – we’d love to hear what’s on your mind about privacy awareness and security awareness training. In the meantime, or perhaps on your way home from the … Continued

View Resource

Contending with Cultures of Corruption

Just one look at the Corruption Perceptions Index map and you can see that we operate in a world fraught with abuse of power, backroom dealings, kickbacks, and bribery—all of which can put your international organization at risk. The popular index evaluates 177 countries, rating them on a scale of 0 (highly corrupt, depicted by … Continued

View Resource
Page 3 of 712345...Last »