Security Awareness Blog: Category - Security Awareness Planning

Awareness Training Ranks High in New Cyber Security Report

Key Awareness Findings from the SANS 2016 Survey on Security and Risk in the Financial Sector What if you could peer into the front lines of the battle against cyber threats in the financial services sector? What role does security awareness play in thwarting attacks? The 2016 SANS Survey on Security and Risk in the … Continue reading Awareness Training Ranks High in New Cyber Security Report


OUCH Newsletter is Out - Using the Cloud Securely

The Novemberedition of the OUCH! security awareness newsletter is out. For this monthwe focus on Using the Cloud Securely. We chose this topic as there is a great deal of unnecessary confusion and fear aboutthe Cloud. Cloud technology isa powerful way to collaborate with others and be far more efficient at work and home. However … Continue reading OUCH Newsletter is Out - Using the Cloud Securely


What the Gartner Magic Quadrant on Awareness Tells Us

As some of you may have noticed, last week Gartner released it's Magic Quadrant report on Security Awareness Training. Every year Gartner does an analysis of the top security awareness vendors and rates them via the Magic Quadrant. While I'm excited to see SANS Securing The Human once again listed at the very top of … Continue reading What the Gartner Magic Quadrant on Awareness Tells Us


Three Simple Steps to Securing Your Home Smart Devices

Editors Note: This blog post is part of Week 04 of #CyberAware month and the #NCSAM Planning Kit. Connected technologies, smart devices, Internet of Things (IoT) - they all mean the same thing. Every day devices that you commonlyuse butare also connected to the Internet. These aredevicessuch as baby monitors, security cameras, thermostats, DVRs, light … Continue reading Three Simple Steps to Securing Your Home Smart Devices


Beyond Phishing: Understand the Principles of Social Engineering

Jane works in the accounting department of a medium sized manufacturing company and just completed her annual awareness training before heading home. She passed the phishing module with flying colors and felt ready for any email type attack that may come her way. While retrieving her keys shereceived a phone call on her mobile phone. … Continue reading Beyond Phishing: Understand the Principles of Social Engineering