I was playing with the site PrivacyRights.org today. This is a tremendous site where you can get valuable statistics on data breaches and compromised records. Privacy Rights collects information on all publicly available breach data, then create a simple interface where you can query that data. I did that today, with an emphasis on the … Continue reading Over 40% of Private Data Compromised Caused by Humans
Recently I was asked a good question by Michael Allen that made me think. Specifically he asked "What would be the best methods/approach to measure the effectiveness of our awareness program"? After noodling on this for a bit my answer is it depends on your organization, what are you attempting to achieve for your organization? … Continue reading Which Security Awareness Metric is the Best?
Editor's Note:This guest blog post is from Kayti Harvey from Astrium. Quite early on we decided that for our IT Security Awareness program in the UK we wanted to adopt a slogan with an accompanying logo. It needed to be a slogan that would encourage users to feel included; "IT Security - you are at … Continue reading Guest Blog Post - A Hero Called Arthur
As many of you have already read, a new 0-day attack has been released for Java. This one is nasty, as not only does the exploit work on the latest versions of Java but we are already seeing the exploit hit the streets in several crimware packs. For more details check out the great write-up … Continue reading Dangers of Java - OUCH!
Several months ago Brian Krebs posted the blog titled the "Value of a Hacked PC", a great visual that demonstrates to Ordinary Computer Users (OCUs) all the different ways their computer and accounts is worth money to cyber criminals. The end goal is to engage people by demonstrating how they are truly a target. Once … Continue reading Free Security Awareness Poster - You Are A Target