CSO Security Awareness Weekly |
| |
|
The Google Docs phishing scam was widespread across the internet recently. Thanks to regular phishing training and a strong security awareness culture, our company was spared and as the CISO, I didn't even have to drive the effort. Our experience illustrates the value of people, awareness, and culture when faced with one of today's most pernicious attack vectors. Read More ▶ |
|
| White Paper: GlobalSCAPE Dante's "9 Circles of Hell" depicts a journey characterized by increasing levels of an individual's depravity, and presumably, increased levels of punishment. There are corollaries when it comes to addressing data integration issues in your environment that, when not properly addressed, create severe levels of "anguish" on a daily basis. Compounded, these issues can affect company efficiency, profitability, and tenure in your current position. Read More ▶ | A sophisticated Russian cyberespionage group is readying attacks against Mac users and has recently ported its Windows backdoor program to macOS. Read More ▶ |
| As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime. Read More ▶ |
| | With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up? Read More ▶ |
| German tax authorities have been bribing Swiss bank personnel to reveal bank data since 2006. In late-April a Swiss national operating on behalf of the Swiss Federal Intelligence Service was arrested in Frankfurt, and charged with having penetrated the North Rhine-Westphalia tax authority for the sole purpose of identifying German tax investigators who travel to Switzerland. A classic case of spy vs spy, played out in the world of banking and taxes. Read More ▶ |
| White Paper: GlobalSCAPE Are you making it too easy for hackers to infiltrate your system? If your employees are using unsanctioned devices and applications, then the answer is yes! Unsanctioned devices and applications can leave your IT infrastructure and data far more vulnerable to being exploited by cybercriminals. Unfortunately, it's become easier than ever for employees to access rogue applications, much to the chagrin of busy IT staff. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|