Security awareness materials you can use – “Why we fall for cons”

| | Awareness, useful stuff
One of my favorite parts of my job as a CSO is building security awareness amongst my colleagues. I really believe that the time put ...
Is Business Email Compromise a “cyber attack?”

Is Business Email Compromise a “cyber attack?”

Just what constitutes a cyber attack? That’s the question facing a court in a case brought against insurer AIG. One of the firm’s clients was ...
Security Awareness 4 Tax Scams

Security Awareness: 4 Tax Scams Making the Rounds Now

With the arrival of the month of April, the United States is heavily into tax season now. And with only days remaining until the April 15 deadline to file, tax-related scams are ...
Security Boulevard
Assess Your Risks

Assess Your Risks

We talk a lot about phishing, vishing, smishing, and impersonation here at SECOM, and there is a good reason for that. Those are the primary services we provide as a company for ...
In 2019, Test Impersonation Attacks

In 2019, Test Impersonation Attacks

At SECOM, we perform many forms of social engineering attacks, from phishing to vishing and smishing as well as impersonation. All of these attacks are used regularly by actual attackers and should ...
Not All Phishing Programs Are Created Equal

Not All Phishing Programs Are Created Equal

In today’s corporate world, security awareness training should be a common puzzle piece in general user onboarding and on-going staff education. With that training, regular testing should also be part of that ...

20 Critical Security Controls: Control 17 – Implement a Security Awareness and Training Program

Today, I will be going over Control 17 from version 7 of the CIS top 20 Critical Security Controls – Implement a Security Awareness and Training Program. I will go through the ...
When Training Does Not Equal Security

When Training Does Not Equal Security

For many organizations computer security training does not appear to impact the user population in a manner that protects the company assets and confidential data as intended. It is a tough balance ...