10 Essentials Every Anti-Phishing Course Must Have
In August 2023, Russian threat actors targeted several government agencies worldwide with Microsoft Teams phishing attacks. Many of these attacks were successful because unsuspecting users fell for the lures set by the attackers—emails purporting to be from trusted senders. Unfortunately, these incidents targeting and successfully infiltrating some government organizations were ... Read More
Paid Cybersecurity Courses: Why They Are Not the Solution for Security Awareness
When it comes to your cybersecurity strategy, humans will always be your weakest link—and your greatest asset. Educating employees in security awareness is integral to protecting your organization from internal and external cyber threats, and leaders are beginning to recognize the gravity and importance of this fact. Cybersecurity courses were ... Read More
A Practical Guide to the SEC Cybersecurity Rules
Imagine making a significant stock investment in the latest hot tech startup—only to find out, much later, that the firm had been the victim of an undisclosed data breach that seriously damaged its customers, reputation, and infrastructure. Would you have invested in the first place had you known the truth? ... Read More
14 Cybersecurity Awareness Topics You Need to Cover
You might be surprised to discover that merely running cybersecurity awareness training programs for your staff is insufficient to foster a robust culture of awareness in your organization. Paying attention to the details of how the training works and the precise topics covered is what sets apart the most security-aware ... Read More
How Can You Protect Yourself From Social Engineering: 5 Essential Steps
Humans are essentially social animals that foster positive emotional well-being through meaningful interpersonal connections. However, this helpful trait can be easily abused through scams perpetrated by social engineering. It’s a con game that’s been going on since the early days of humanity—but today, with social interactions transcending physical boundaries online, ... Read More
HIPAA and Privacy Act Training Challenge Exam [XLS download]
Contemporary healthcare organizations are obligated to protect a vast amount of sensitive patient data due to the broad definition of Protected Health Information (PHI) under the Health Insurance Portability and Accountability Act (HIPAA). The proliferation of electronic health records, digital health technologies, and the need for data sharing across a ... Read More
The Essential User Access Review Checklist [Excel Template]
Do you have employees with access to sensitive systems they no longer need? Are there team members in your organization who, following a department change, find themselves locked out of essential tools critical for their new roles? For many businesses, the answer to these questions is yes. Maintaining precise control ... Read More
The Essential Guide to HIPAA Training Requirements
Healthcare organizations and contractors in the United States face challenges beyond caring for the sick and wounded—they also have to protect their patients’ data. Protected health information (PHI) must be safeguarded from breaches and unauthorized access under the Health Insurance Portability and Accountability Act (HIPAA). However, healthcare data breaches have ... Read More
How to Prep for the DoD Annual Security Awareness Refresher
For agencies and contractors that work under the U.S. Department of Defense (DoD), preventing data breaches and cyberattacks is a matter of national security. Given that even the most robust technological defenses can be undermined by simple human error, the DoD puts considerable importance on cybersecurity awareness training. Parties entrusted ... Read More
An In-Depth Guide to the 11 New ISO 27001 Controls
From the crudest low-effort phishing attempts to the most sophisticated high-tech hacks, the hits never stop coming. An effective defense against these threats requires a consistent and comprehensive security posture like the one outlined in the ISO 27001 standard. As daunting as these threats seem, up to 80% can be ... Read More