As part of Securing The Human's commitment to the community, every month we post a new security awareness video. For February, we just released our newest awareness video "Advanced Persistent Threat". This five minute video explains in simple terms what APT is, walks your through how they operate, and what you can do to protect … Continue reading New Awareness Video of the Month - Advanced Persistent Threat (APT)
Building, maintaining and measuring a high-impact Security Awareness Program requires a great deal of planning and hard work. Often organizations find themselves overwhelmed, under resourced and do not know where to start. That is why we developed the community based resource the Security Awareness Roadmap. The Roadmap identifies the five stages to a mature security … Continue reading New Planning Resource - The Interactive Security Awareness Roadmap
People are in many ways nothing more than another operating system. Just like any computer or mobile device, people store, process and transfer information. Just like any computer or mobile device, people are an end point that cyber attackers are aggressively attacking. Unlike computers or mobile devices, the HumanOS remains highly vulnerable with organizations doing … Continue reading The Most Insecure Operating System on Your Network
I was playing with the site PrivacyRights.org today. This is a tremendous site where you can get valuable statistics on data breaches and compromised records. Privacy Rights collects information on all publicly available breach data, then create a simple interface where you can query that data. I did that today, with an emphasis on the … Continue reading Over 40% of Private Data Compromised Caused by Humans
Recently I was asked a good question by Michael Allen that made me think. Specifically he asked "What would be the best methods/approach to measure the effectiveness of our awareness program"? After noodling on this for a bit my answer is it depends on your organization, what are you attempting to achieve for your organization? … Continue reading Which Security Awareness Metric is the Best?