HackDig : Dig high-quality web security articles for hacker

What Cybersecurity Professionals Do Versus What Our Coworkers Think We Do

We’ve probably all seen that “perception versus fact” meme where there’s an assortment of pictures with captions like “what my family thinks I do,” “what my boss thinks I do,” “what I think I do” and “what I actually do.” People’s understanding of what cybersecurity professionals d
Publish At:2019-10-18 10:20 | Read:536 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) National Cybe

6 Common Phishing Attacks and How to Protect Against Them

Phishing attacks don’t show any sign of slowing down. Per its 2019 Phishing Trends and Intelligence Report, PhishLabs found that total phishing volume rose 40.9 percent over the course of 2018. These attacks targeted a range of organizations, especially financial service companies, email and online service providers and cloud/file hosting firms. It’s, theref
Publish At:2019-10-18 10:10 | Read:577 | Comments:0 | Tags:Featured Articles Security Awareness business email compromi

NCSAM: It’s Everyone’s Job to Ensure Online Safety at Work

October is National Cyber Security Awareness Month (NCSAM). NCSAM is a great initiative to help educate and inform our friends and family on the importance of taking your digital security seriously. To help continue to support this initiative, we asked a range of industry experts to share some of their tips to help us stay safe online.Angus Macrae | Head of
Publish At:2019-10-18 10:10 | Read:471 | Comments:0 | Tags:Featured Articles Security Awareness cybersecurity NCSAM Res

Top Tax Scams to Watch out For

Diligent taxpayers are being increasingly targeted by con artists who are well-versed in manipulating the revenue system. The crooks usually impersonate IRS (U.S. Internal Revenue Service) officials, sending fake emails or messages on social media in an attempt to defraud the targeted individuals of their money. Unfortunately, lots of people fall for these s
Publish At:2019-10-18 10:10 | Read:433 | Comments:0 | Tags:Security Awareness IRS scam tax

Clean IT Up: Cyber Hygiene Controls Tips

October is national cybersecurity awareness month, and with the recent hacks at Door Dash, the discovery of a large-scale iOS hacking campaign, and a database containing 419 million phone numbers associated with Facebook accounts, we’re all likely feeling a little dirty. So, I decided to share my perspectives on cyber hygiene.The dictionary defines hygiene a
Publish At:2019-10-18 10:10 | Read:404 | Comments:0 | Tags:Featured Articles Security Awareness cyber hygiene supply ch

The Evolution of Phishing: The Spear Is Aimed at You

You can’t go a week without seeing a story about a data breach or ransomware hitting organizations. These breaches can be very costly, but they still continue to show up. Are the good guys not winning the cybersecurity war? Organizations invest millions of dollars in security products and services, but they keep getting breached.We definitely have a skills g
Publish At:2019-10-18 10:10 | Read:717 | Comments:0 | Tags:Security Awareness data breach ransomware spear fishing

Nine More NCSAM Tips for Cybersecurity Professionals: Week Four

What have you learned during National Cybersecurity Awareness Month (NCSAM) that could help drive change in your organization? We’ve featured 22 tips so far, so there should be at least a few things for you to work on. Maybe your company needs to revamp its cybersecurity training or do a better job managing data. As with anything in life, there is alwa
Publish At:2017-11-01 00:20 | Read:4361 | Comments:0 | Tags:Risk Management Cybersecurity IBM IBM Security National Cybe

Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity

Stress comes with the territory for chief information security officers (CISOs). As noted by Medium, the job is unpredictable, with “long periods of preparing, watching, waiting, punctuated by periods of high stress and occasional bruising.” As both vendors and cyberthreats proliferate, finding a balance between an effective cybersecurity strateg
Publish At:2017-10-31 05:50 | Read:3181 | Comments:0 | Tags:CISO Automation C-Suite Chief Information Security Officer (

Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Power grids are a tantalizing targets for sophisticated attackers. In the U.S., every major economic sector relies heavily on electricity. That dependence includes the military as well. Given the rising threat levels, it isn’t surprising that there are calls for the Department of Defense to ends its reliance on the power grid for key military installat
Publish At:2017-10-31 05:50 | Read:2622 | Comments:0 | Tags:Energy & Utility Risk Management Access Management Energy an

Security Awareness Training Is a Team Effort

A security awareness program is a critical part of any security strategy. It is not enough to simply hold everyone in the organization accountable. Chief information security officers (CISOs) must first train employees to practice proactive, conscientious security behaviors by convincing them that security affects them directly, not just the business. Buildi
Publish At:2017-10-31 05:50 | Read:3119 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

Employees Must Wash Hands: 11 Tips to Translate Awareness Into Better Security Hygiene

Are you security-aware? A lot more people today are answering yes than in previous years. Perhaps it’s because of their organizations’ own security awareness efforts, or maybe it’s due to the influx of news stories about ransomware, credit card hacks, data breaches and identity theft. If people are more aware of cybersecurity concerns, does
Publish At:2017-10-26 01:10 | Read:3474 | Comments:0 | Tags:CISO Risk Management Cybersecurity Training Education Nation

Three Tips to Help Your Organization Hit Data Protection Out of the Park

When implementing a new business plan or technology, it’s easy to draw parallels between coaching employees on best practices and coaching an athletic team in pursuit of a victory. Both require teamwork, extensive training and careful consideration of how the individual strengths of each player come together to create a cohesive working unit. As the Ma
Publish At:2017-10-23 17:50 | Read:5165 | Comments:0 | Tags:Data Protection Cybersecurity Training Data Breach Data Secu

Today’s Predictions for Tomorrow’s Internet: IBM Experts Look Ahead for NCSAM

In case you haven’t noticed the flood of dedicated content here on SecurityIntelligence, not to mention Twitter, we are currently in the midst of National Cyber Security Awareness Month (NCSAM). The overarching theme of this year’s campaign is “Securing the Internet Is Our Shared Responsibility,” which is a critical lesson to remember
Publish At:2017-10-22 05:00 | Read:2984 | Comments:0 | Tags:CISO Education IBM Security National Cyber Security Awarenes

Five Key IT Security Best Practices to Safeguard Your Expanding Business

A key theme of the recent Cybersecurity Nexus event in Washington, D.C. was the growing need for small and medium-sized businesses (SMBs) to adopt enterprise-like IT security best practices. In fact, SMBs might actually have an edge over the unrelenting competition they endure from larger enterprises because they are more proactive and nimbler in mitigating
Publish At:2017-10-22 05:00 | Read:3935 | Comments:0 | Tags:Application Security Retail Risk Management Application Secu

Your Security Awareness Program Stinks. Here’s Something You Can Do About It

If you ask a group of technology and business professionals to rank the most important parts of their security program, awareness and training will undoubtedly land in the top three. After all, many breaches start with users and, on the flip side, can be prevented by users. It’s all about setting expectations. Unfortunately, many such attempts fall fla
Publish At:2017-10-22 05:00 | Read:2485 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud