AREN'T BLOGS FUN?? THIS IS OURS.
Security awareness trainings protect enterprises from data breaches and are necessary in certifying compliance with a wide number of regulatory standards
Each year for the past 4 years I've made the trek to a new city to join my fellow security awareness nerds, and sometimes to present to them, about what's going on in the security awareness industry. It's a great networking event, sometimes called a 2-day venting session, as we share problems and issues with our programs as well as successes and new ways to approach old problems.
In this webinar, Habitu8 cofounders Jason Hoenich and Chad Loder discuss how to put together a phishing simulation training program. Learn how most companies mis-label repeat responders.
This is the world of social engineering—i.e., tricking people out of private information. It’s cheap, easy, and terrifyingly effective. Here are some of hackers’ favorite ways of using social engineering.
Security Awareness 2.0 is a revolutionary approach that makes training not only more effective, but more enjoyable. Shifting to Security Awareness 2.0 requires a change in attitude and adopting a few basic principles.
National Cyber Security Awareness Month (NCSAM) is a big deal. Occurring every October, NCSAM started life as an American effort and has grown into a worldwide phenomenon. In this webinar, founders Jason Hoenich and Chad Loder use real-world knowledge to discuss how to use NCSAM to engage coworkers and create unique experiences.
Should you train your contractors in cyber security awareness? The short answer is YES, but there are important HR and legal issues you need to consider before rolling it out. If you approach this without careful planning, you could run afoul of taxation and labor laws governing the classification of employees vs. independent contractors. Read on to understand how to navigate this issue and get everyone trained up!
Like many corporate workshops, security awareness trainings have a reputation for being deadly dull. For organizations that want to counter cyberattacks, boredom is a real barrier to fostering a security culture.
We’re stuck in the space of not wanting to acknowledge how crucial and important the process of security awareness program management is with vendors wanting to push and sell a magic product that “does everything”.
Collecting metrics in a constantly changing risk environment can be challenging, especially given the lack of universally accepted measurements. The good news is that there are straightforward ways of obtaining accurate, useful metrics. Here are five ways of securing important metrics.