Security Awareness Blog: Cyber Security Awareness News, Online Safety Advice & Security Cat
May08, 2019

How Do Security Breaches Affect Reputation and Operations?

By |Guest Post|

Data is the lifeblood of all businesses in the 21st century. Organizations use data for competitor analysis, market behavior prediction, process optimization, and more. With the right data, companies can easily get an edge in their industries and optimize their performance to lower costs and make higher profits. This explains why cybercriminals are constantly launching attacks on organizations’ data systems. A data security breach can cause significant damage to your business. Depending on the type [...]

Apr30, 2019

PII: The Journey to Understanding Personally Identifiable Information

By |Security Awareness 101|

PII, or personally identifiable information, is sensitive data that could be used to identify, contact, or locate an individual. Examples of PII Personally identifiable information includes, but is not limited to: Home addresses Personal phone numbers National ID numbers Personal email addresses Credit card numbers Examples of Non-PII Info such as business phone numbers, business email addresses, race, religion, gender, workplace, and job titles, are typically not considered personally identifiable information. But they [...]

Apr24, 2019

Your Security Awareness Program: Make it personal

By |Guest Post|

User engagement represents one of the biggest challenges a security awareness program (SAP) can face. With so many processes, procedures, policies, and content being pushed to employees on a nearly daily basis, it can be an overwhelming amount of information for any individual to retain (or even care about). Knowing this, what is the best way to increase engagement? To increase the adoption rate of your program and your employees’ engagement in your monthly activities, [...]

Apr17, 2019

Security Awareness Programs: How much do they cost?

By |Guest Post|

A common misconception about security awareness programs (SAPs) is that they are expensive to implement and maintain. When you consider all the things that might be included—headcount, content creation, on-site events, SWAG, security compliance courses, and phishing assessment tools—SAPs seem like costly ventures. However, organizations both large and small can implement programs with small budgets and a little bit of creativity. Below are some creative ways to launch and maintain your program without breaking the [...]

Apr09, 2019

Cyber Disruption: How to Prepare & What to do During an Incident

By |Guest Post|

The new normal: a massive data breach impacts hundreds of thousands of people, a denial-of-service campaign disrupts operations, a ransomware attack locks up systems. In today’s climate of cyber threats, it’s only a matter of when — not if — organizations face an attack and must deal with the consequences. Preparation and response to those attacks determines their impact. Whether it be a lost laptop or a massive data breach, organizations of every industry must [...]

Load More Posts