article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

The employees at your organization are badly in need of security awareness training. “B” is obviously the correct choice, but not all companies succeed in motivating their workers to learn the ins and outs of phishing, social engineering and other cyber threats. What do you do? That’s the fun part of it.

article thumbnail

Understanding the Essential Pillars of Phishing Mitigation

SecureWorld News

In our most recent Remote Sessions webcast, Roger Grimes, computer security expert and Data-Driven Defense Evangelist for KnowBe4, gave a deep dive on phishing and how to properly mitigate and prevent phishing attacks. What is phishing? If you detect a phishing email, make sure to avoid all links, and report them!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

The Last Watchdog

There are additional safety measures you can (and should) take to teach your child as they grow, things like installing virus protection, enabling multi-factor authentication, using password managers, and raising awareness about phishing scams. Make it a family conversation. About the essayist.

Scams 203
article thumbnail

Security Roundup August 2023

BH Consulting

Privacy progress: Dr Valerie Lyons’ book publication and award nomination Congratulations to BH Consulting chief operations officer Dr Valerie Lyons, who will become a published author later this year. Her book, “The Privacy Leader Compass” is available to pre-order from 1 November.

article thumbnail

Carnival discloses new data breach on email accounts

SC Magazine

The data accessed included names, addresses, phone numbers, passport numbers, dates of birth, health information, and, in some limited instances, additional personal information like social security or national identification numbers. ” Interestingly, the letter from Carnival said there was a “low likelihood” of the data being misused.

article thumbnail

Why the Language of Cybersecurity Awareness Needs to be More Accessible

BH Consulting

Victoria Baines has literally written the book about the language we often find in the industry, ‘ Rhetoric of Insecurity ’. On her excellent ‘Beyond the phish’ Substack, she made a plea to stop inventing new terms for scams. I have yet to hear anyone in the public groups I work with say vish smish or phish. Ask: who is it for?

article thumbnail

September Snafus: Hackers Take Advantage of Unwitting Employees

Approachable Cyber Threats

All of the attacks were carried out with relatively simple phishing and social engineering techniques. IHG’s booking sites and apps were unavailable for several days as a result. Phishing and poor password practices. The couple claimed that they were able to trick an employee into downloading malware from a phishing email.