Security Awareness Blog: Category - Security Awareness Planning

The 3rd Top Three Security Awareness Topics

Earlier this week we discussed the importance of focusing your awareness training on a few, high-impact topics and then identified what we consider the top nine within the SANS Securing The Human library. Today we discuss the third and last set of three of those topics and why our Advisory Board selected them. Passwords: Let's … Continue reading The 3rd Top Three Security Awareness Topics


The 2nd Top Three Security Awareness Topics

Earlier this week we discussed the importance of focusing your awareness training on a few, high-impact topics and then identified what we consider the top nine within the SANS Securing The Human library.Today we discuss the second set of three of those topics and why our Advisory Board selected them. Browsing: Browsers are one of … Continue reading The 2nd Top Three Security Awareness Topics


1st Three Key Security Awareness Topics

Earlier this week we discussed the importance of focusing your awareness training on a few, high-impact topics and then identified what we consider the top nine. Today we discuss the first three of those topics and why our Advisory Board selected them. You Are A Target: If people do not understand they are a target, … Continue reading 1st Three Key Security Awareness Topics


Top 9 Topics for Your Awareness Program

Twice a year at Securing The Human we do a complete review of our security awareness training library. We start with reviewing all the topics and identify if we should add any new ones or remove any old ones. We then review the existing topics to see if any should be updated. We have just … Continue reading Top 9 Topics for Your Awareness Program


Engage With a Story - Hacking a Utility

A target groups we are attempting to reach on cyber security are the engineers and operators who run critical infrastructure, such as those responsible for power generation, oil refineries, and water plants. This may not be as sexy as some other industries, but without it life as we know it would literally shutdown. As such, … Continue reading Engage With a Story - Hacking a Utility