Remove CISO Remove Ransomware Remove Security Awareness Remove Social Engineering
article thumbnail

Threat Intelligence and Security Awareness?

SecureWorld News

In our exclusive Behind the Scenes interview series, we take a deeper look at a topic that is relevant to the information security community. Today's conversation answers this question: How can threat intelligence strengthen security awareness? The pandemic is on everyone's mind, and they're using that for social engineering.

article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry.

CISO 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. To pursue cybersecurity culture change, we recommend you to institute a cost-effective, company-wide security awareness training for your employees.

article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

We asked a few practitioners for their take on rising inflation and how it is making their jobs keeping their organizations secure more difficult—and what they are doing to try to combat these issues. "I Andrew Smeaton, CISO at Afiniti, says reassessment of cybersecurity programs and plans is necessary.

article thumbnail

IRISSCON 2022 roundup: a new hope

BH Consulting

He analysed ten years of ransomware and found the problem, in terms of volume and frequency, was in 2014. “So So something good is already happening… We’ve already survived peak ransomware in the historical view,” he said. Ransomware: don’t pay later. Don’t use your insurance policy as your ransomware response.

article thumbnail

NIST and No-notice: Finding the Goldilocks zone for phishing simulation difficulty

Webroot

Earlier this year, the National Institute for Standards and Technology (NIST) published updated recommendations for phishing simulations in security awareness training programs. Phishing tests that are too easy do little to address a problem that’s become one of the most common methods of entry for ransomware attacks.

Phishing 109
article thumbnail

Preventing Critical Email Attacks: Brian Krebs and Mike Britton Discuss

SecureWorld News

That was the case for a broadcast SecureWorld recently hosted with Mike Britton, CISO of Abnormal Security , and legendary investigative journalist Brian Krebs. Key takeaway #3: Social engineering is the most powerful attack vector against InfoSec protocols.

InfoSec 77