Blog Posts Tagged with "Security Awareness"


Creating a Culture of Security

September 21, 2011 Added by:Jim Anderson

Infosec practitioners tend to look for "bright shiny objects" and focus on those as the centerpiece of their programs. Often, training is an afterthought and awareness is relegated to "lunch and learn" status. Ross does an excellent job of covering the benefits of a constructive security culture...

Comments  (0)


Tips to Beat Back-to-School Identity Theft

August 26, 2011 Added by:Kelly Colgan

September—that whirlwind season of back-to-school registration, dorm move-ins, and sports sign-ups—ushers in a sleigh-full of identity theft opportunities. It’s not just invincible college freshmen who are at risk. Parents can expose kids to fraud without realizing it...

Comments  (3)


Here's a Tip for Your Waitress: Don't Rip Me Off

August 19, 2011 Added by:Kelly Colgan

A Florida waitress used a skimmer to steal their credit card information, make new cards and rack up thousands of dollars in charges at Radio Shack and Walmart—all on their dime. The 25-year-old told authorities she targeted customers who she thought treated her poorly by running her around...

Comments  (1)


The Real Consequences of an Anonymous Data Leak

August 17, 2011 Added by:Rafal Los

I know many of my colleagues in infosec sympathize with the Anonymous cause, because it's not too difficult to do so. While I won't comment on how I feel about that - I can tell you I absolutely do not condone the reckless actions and short-sighted activity that leads to more harm than good...

Comments  (2)


NIST Seeks Comments on National Initiative for Cybersecurity

August 16, 2011 Added by:Headlines

The plan, "Building a Digital Nation," outlines NICE's mission, vision, goals and objectives. NIST and its interagency NICE partners seek comments from all interested citizens and organizations concerned with cybersecurity awareness, training and education...

Comments  (1)


Ten Password Tips that Never Go Out of Style

August 10, 2011 Added by:Allan Pratt, MBA

I know what you’re thinking: not another post about passwords. The truth is, no matter how many times those of us in the infosec arena talk, cajole, and plead with users to create complex passwords, they don’t follow directions. Instead, they come crying to us after something bad happens...

Comments  (9)


U.N. Endorses EC-Council’s Global CyberLympics

August 09, 2011 Added by:Headlines

The cybersecurity executing arm of the UN has endorsed the Global CyberLympics, a new initiative by the EC-Council to foster international cooperation on information security issues and to improve cybersecurity training and awareness in developing nations and third world countries...

Comments  (0)


The ABZs of Cybersecurity

July 09, 2011 Added by:Pete Herzog

The points made in this article reflect the research findings outlined in the OSSTMM 3: operational security controls, security and trust metrics, and the Moebius Defense security model where environmental protection precedes security awareness. You can find OSSTMM research at the ISECOM website...

Comments  (1)


Developing a Security and Privacy Awareness Program

June 23, 2011 Added by:Allan Pratt, MBA

When security breaches occur, customer trust is lost, brand value disintegrates, and breach response results in significant costs to the business. The time involved for breach responses can go on for years, and resulting penalties and sanctions could extend into the millions of dollars...

Comments  (1)


Get Digitally Secure Before it’s Mandatory

June 17, 2011 Added by:Robert Siciliano

It is possible to secure systems against most cybercrime but that level of security often proves too inconvenient for consumers. As long as banks continue absorbing losses from fraud, consumers remain blissfully ignorant of the consequences of inadequate security...

Comments  (0)


Security Awareness and Why Things Aren't Improving

June 03, 2011 Added by:Don Eijndhoven

While the use of internet technology has grown exponentially over the last decade, users have not grown much wiser in terms of security. Largely this is because the populace simply does not see the danger in having their online identities compromised; its too abstract a notion...

Comments  (0)


Infosec: Is the Cynic-Signal Broken?

May 27, 2011 Added by:Javvad Malik

Why do they put brakes in cars? If you answered “to make you stop”, you’re kind of wrong. The correct answer is, they put brakes in cars so that you can go faster. In many ways, security is similar. However, security doesn’t just bolt onto a business - it's a mindset...

Comments  (0)


Social Engineering Gains Ever More Credibility

May 24, 2011 Added by:PCI Guru

At the end of the day, everything in an organization’s security posture comes down to the people who interact with the information you are trying to protect. It only takes one person having a bad day to make all of an organization’s security technology and other controls impotent...

Comments  (0)


The "Lots of Sex" Risk and Security Project

March 16, 2011 Added by:Pete Herzog

Routines make us predictable which, becomes our flaw. The problem with "patching" these flaws is that they are design features which are the product of being human. In addressing those flaws we will also ruin many of the good things about people which make them creative, social, and productive...

Comments  (8)


Social Engineering: The Art of Human Hacking

March 16, 2011 Added by:Ben Rothke

Far too many people think that information security and data protection is simply about running tools, and too many technology books focus on the hardware and software elements, completely ignoring the human element. The social engineer can then use that gap to their advantage...

Comments  (0)


Does Your Company Have a Security Awareness Training Program?

March 10, 2011 Added by:Allan Pratt, MBA

Topics to discuss include good security practices such as making regular back-ups, encrypting sensitive data, turning off computers before leaving the office, carefully disposing of storage devices, and not installing illegal copies of software on company computers or devices...

Comments  (6)

Page « < 9 - 10 - 11 - 12 - 13 > »