Security professionals can follow four tips to ensuring organizational data privacy, including interdepartmental communication, security training, and data management.
Identity theft and imposter scams were some of the top fraud techniques employed by scammers to defraud users out of $5.9 billion in 2021, according to data from the Federal Trade Commission (FTC).
Security talks to Jann Yogman, who has written and produced comedy for Michael J. Fox, Dana Carvey and Conan O'Brien during his career. Yogman brought his comedy skills to Mimecast to help out with cybersecurity awareness training, structuring the program like seasons of a situation comedy, with actual comedic actors playing repeating characters.
Maintaining security awareness is something that many companies struggle to maintain, particularly in the logistics and transportation sectors. Even though there are major threats to these industries, awareness of threats remains low.
nVisium released the findings of their recent research which explores the current state of cybersecurity awareness and security training initiatives within today’s remote workforce. The research reveals that only 35% of respondents classify security awareness training as a ‘top priority’ while working remotely, and nearly half say that their DevOps teams are not experts in understanding how to protect at home wireless networks.
Security awareness training is no longer a “nice-to-have” for organizations. End users have become a critical component of effective security postures. Employees must have a strong understanding of cybersecurity best practices and learn how to detect and defend against targeted attacks. This shift in priority is needed to address an ongoing trend in the larger threat landscape. Cybercriminals have moved away from complicated, time-consuming technical exploits to concentrate on end users, a large and frequently vulnerable attack surface. Small or large, nearly every attack now begins in the same way: by relentlessly targeting people through email, social networks, and/or cloud and mobile applications.