article thumbnail

Protect your business with security awareness training

SiteLock

Cybercriminals know this, which is why phishing attacks account for more than 80% of reported security incidents and why 54% of companies say their data breaches were caused by “negligent employees. ”. The reason many employees use the same passwords across all work accounts is simple – they can keep track of them all.

article thumbnail

Phorpiex botnet sent millions of phishing emails to deliver LockBit Black ransomware

Security Affairs

.” To defend against ransomware campaign like this one, NJCCIC provided the following recommendations: Security Awareness Training : Engage in security awareness training to enhance defense mechanisms and recognize potential signs of malicious communications.

Phishing 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: A foolproof consumer’s guide to creating and managing bulletproof passwords

The Last Watchdog

It can be a real hassle to keep track of the passwords you use. So many people use the same combination of username and password for every account. Related: Kaseya hack exacerbates supply chain exposures. You see, these days, many data breaches could be traced back to people using the same password across multiple accounts.

Passwords 133
article thumbnail

Retail giant Home Depot agrees to a $17.5 million settlement over 2014 data breach

Security Affairs

“This settlement ensures Home Depot complies with our state’s strong data security law and requires the company to take steps to protect consumer information from illegal use or disclosure.” SecurityAffairs – hacking, Data breach). million settlement over 2014 data breach appeared first on Security Affairs.

Retail 119
article thumbnail

ROUNDTABLE: Targeting the supply-chain: SolarWinds, then Mimecast and now UScellular

The Last Watchdog

It’s only February, and 2021 already is rapidly shaping up to be the year of supply-chain hacks. 21 disclosed how cybercriminals broke into its Customer Relationship Management (CRM) platform as a gateway to compromise the cell phones of an undisclosed number of the telecom giant’s customers. Related: The quickening of cyber warfare.

Phishing 252
article thumbnail

Podcast Episode 113: SAP CSO Justin Somaini and Election Hacks – No Voting Machines Required!

The Security Ledger

Everybody worries about hacked voting machines. Also: October is just around the corner and that means Cyber Security Awareness Month is upon us. So what are top cyber security professionals “aware of” these days? In this week’s podcast (#113): Everybody worries about hacked voting machines.

CSO 40
article thumbnail

Cybersecurity Culture: From Onboarding Training to Proactive Practice

SecureWorld News

Other things to go over during this time include strong password management, multi-factor authentication (MFA), and the risks of using personal devices on work networks. Make security awareness training relevant. Highlight how best security practices apply to work and home life. Avoid ambiguity.