Education and Careers

Education and Careers

What Are Honeywords? Password Protection for Database Breaches

| | Security Awareness
Introduction Despite all the recent advancements in information security technology, the basic problem of hacking into a server or database has not been solved. Hackers and attackers can still, with... Go on ...

What Is a Data Protection Officer?

| | Security Awareness
Introduction to the General Data Privacy Regulation The General Data Privacy Regulation (GDPR) governs how the personal data of EU citizens can be collected, transmitted, processed and stored inside... Go on to ...

How a Data Protection Officer Will Benefit Your Organization

| | Security Awareness
In May of 2018, the European Union’s General Data Protection Regulation (GDPR) came into force. This wide-reaching law touches any company, no matter what size or type, as long as they process ...

Building a Security Awareness Program on an Organizational Level

| | Security Awareness
Introduction: A Case Study Liz Raymond finally had some peace and quiet in her office. The day had been quite chaotic, but now that there were only a few minutes left before ...

Spam or Phish? How to Tell the Difference Between a Marketing Email and a Malicious Spam Email

| | Security Awareness
Virtual crime is a side effect of the convenience of technology. With greater strides in technology making everything from banking to communication faster and easier, cybercriminals are also finding... Go on to ...

What Is Protected Health Information (PHI)?

| | Security Awareness
Healthcare is a data-rich industry. These data are created across the entire healthcare ecosystem; they represent a wealth of information that can be used to ultimately lead to better patient... Go on ...
Security-Leaders-Relevant

What Security Leaders Can Do To Stay Relevant

| | CISO, Leadership, sales, security leaders
During this year’s Exabeam Spotlight18 conference in Las Vegas, amid the conversations about building a modern SOC or a successful insider threat program, Steve Moore, chief cybersecurity strategist at Exabeam, discussed the ...
Security Boulevard

Spam Filtering Cheat Sheet: 14 Ways to Reduce Spam

| | Security Awareness
What Is Spam? Spam is usually defined as irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware... Go ...
Best Practices for Identifying Dangerous Emails

Best Practices for Identifying Dangerous Emails

| | Security Awareness
Disturbing Trends in Email Cyberattacks – the Statistics Symantec’s 2018 Internet Security Threat Report makes for disturbing reading about malicious email trends: The average user in the study by... Go on to ...

Nine Major Phishing Attacks of 2018 (and How to Spot Them)

| | Security Awareness
Phishing attacks are the most common type of cyberattack for good reason: because they work. If an attacker can convince you to click on a link in a phishing email and enter ...
Loading...