Remove CISO Remove Phishing Remove Social Engineering Remove Technology
article thumbnail

Defending Against Credential Phishing Starts by Protecting Your Users

SecureWorld News

As the global pandemic continues to run rampant, CISOs are not only struggling to solve traditional cybersecurity challenges, but are faced with a new surge of pandemic themed phishing scams intended to deceive users and infiltrate organizations. How do I make my users more resilient to phishing scams?

article thumbnail

NIST and No-notice: Finding the Goldilocks zone for phishing simulation difficulty

Webroot

Earlier this year, the National Institute for Standards and Technology (NIST) published updated recommendations for phishing simulations in security awareness training programs. The thinking obviously being that letting users in on the phishing simulation game will heighten suspicion of their inbox and skew baseline results.

Phishing 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tackling Cyber Threats: Is AI Cybersecurity Our Only Hope?

Jane Frankland

On one hand, AI has been hailed as a game-changing technology with the potential to transform industries and improve our daily lives. As technology advances, cybercriminals are finding new ways to exploit vulnerabilities and infiltrate systems. As CISOs, and ITDMs who are responsible for cybersecurity we can do three things: 1.

article thumbnail

The challenges of being a CISO during the COVID-19 pandemic

IT Security Guru

The pre-COVID-19 CISO. The global COVID-19 pandemic has been a tumultuous time for Chief information security officers (CISOs) who on any given day have a long and complicated list of responsibilities. When employees click on the link, recipients are not immediately getting the page on their browser or in their device.

CISO 55
article thumbnail

GUEST ESSAY: 6 steps any healthcare organization can take to help mitigate inevitable cyber attacks

The Last Watchdog

Knowing what Information Technology (IT) hardware exists is a good place to start (servers, laptops, desktops, tablets, etc.). Many security programs focus on employee education (creating a strong password, being aware of phishing, etc.). As technology and threats evolve, so must the security organization. Educate employees.

article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry. We must reduce barriers to entry.

CISO 117
article thumbnail

Three Risk Mitigation Strategies to Address the Latest Data Security Threats

CyberSecurity Insiders

By Dannie Combs , Senior Vice President and CISO, Donnelley Financial Solutions (DFIN) As security threats to data continue to ebb and flow (mostly flow!), The latest bill to address data threats is the RESTRICT Act , also known as the Restricting the Emergence of Security Threats that Risk Information and Communications Technology Act.

Risk 118