HackDig : Dig high-quality web security articles for hacker

Don’t Respond to Suspicious Emails

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/responding%20to%20threats.png?width=300&amp;name=responding%20to%20threats.png" alt="responding to threats" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">Sometimes when sending phishing simulations to our clients, we setup a reply-to address to see if people will
Publish At:2019-10-29 10:40 | Read:426 | Comments:0 | Tags:security awareness training Cyber Security Awareness Month N

More Bees with Honey? Reinforcement vs. Punishment in a Security Training Program

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Copy%20of%20Copy%20of%20Social%20Media%20phishing.png?width=300&amp;name=Copy%20of%20Copy%20of%20Social%20Media%20phishing.png" alt="Copy of Copy of Social Media phishing" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">Ambassadors of security training programs oft
Publish At:2019-10-22 16:15 | Read:171 | Comments:0 | Tags:security awareness training NCSAM

Beware of Account Takeover

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/account%20takeover.png?width=300&amp;name=account%20takeover.png" alt="account takeover" width="300" style="width: 300px; margin: 0px 0px 10px 10px; float: right;">One way to verify if an email is legitimate is to look at the sender’s address, the actual sender’s address, not just the sender
Publish At:2019-10-15 10:40 | Read:194 | Comments:0 | Tags:security awareness training Cyber Security Awareness Month N

Grease the Skids: Improve Training Successes by Optimizing the Environment

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/NCSAM%202.png?width=300&amp;name=NCSAM%202.png" alt="NCSAM 2" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">You have carefully selected a training program. Employees are completing the courses. And yet, they are not reporting suspicious emails and their passwords
Publish At:2019-10-11 22:40 | Read:357 | Comments:0 | Tags:security awareness training Cyber Security Awareness Month N

Training Not Sinking In? Try a Programmatic Approach

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Programmatic%20approach.png?width=300&amp;name=Programmatic%20approach.png" alt="Programmatic approach" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">In honor of National Cybersecurity Awareness Month (CSAM), Dane Boyd, PhishLabs’ Security Training Manager, and I
Publish At:2019-10-01 10:40 | Read:279 | Comments:0 | Tags:security awareness training Cyber Security Awareness Month N

Meet the Cyber Security Awareness Team: Kimber

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Copy%20of%20Ryan%20Phish.png?width=300&amp;name=Copy%20of%20Ryan%20Phish.png" alt="Meet the Team: Kimber B" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;">In our ongoing contributions to Cyber Security Awareness Month today we’re launching a two-part series design
Publish At:2019-09-19 22:40 | Read:190 | Comments:0 | Tags:security awareness training

Meet the Cyber Security Awareness Team: Dane

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Dane%20(1).png?width=300&amp;name=Dane%20(1).png" alt="Dane" width="300" style="width: 300px; margin: 0px 10px 10px 0px; float: right;">In our ongoing contributions to Cyber Security Awareness Month today we’re launching a two-part series designed to introduce you to some of our team.</p&
Publish At:2019-09-19 22:40 | Read:226 | Comments:0 | Tags:security awareness training

Users Failing Phishing Simulations? That’s ok

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/mistake-1966448_1920.jpg?width=300&amp;name=mistake-1966448_1920.jpg" alt="mistake-1966448_1920" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;">Phishing simulations come with a range of emotions for the users who interact with them. Some will simply ignore them, o
Publish At:2019-09-19 22:40 | Read:235 | Comments:0 | Tags:security awareness training

Less Than 3 Percent of ‘Collection #1’ Data Dump Passwords are Unique

<p>This month the largest recorded data dump in history, 87GB filled with passwords and user credentials, was made available. Dubbed Collection #1 consists of 1,160,253,228 unique combinations of email addresses and passwords. Though historic, there are two positive notes regarding this information: The first is that this data set was circulated on hac
Publish At:2019-09-19 22:40 | Read:130 | Comments:0 | Tags:security awareness training

How to Cut Healthcare Cyber Incidents by 80 Percent

<p>Healthcare data breaches are among the most costly of any industry, and phishing attacks&nbsp;are the number one cause.&nbsp;</p> <p>Security technologies, while essential, are not enough to mitigate the threat posed by phishing. Over 90 percent of data breaches contain a phishing component, and the average cost to remediate a
Publish At:2019-09-19 22:40 | Read:142 | Comments:0 | Tags:security awareness training Healthcare

It Only Takes One to Detect or Infect

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/report%20phish.png?width=300&amp;name=report%20phish.png" alt="report phish" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;">It’s time to take action against phish! Phishing attacks are no longer few and far between, they are the norm.</p> <p>Regardle
Publish At:2019-09-19 22:40 | Read:165 | Comments:0 | Tags:security awareness training Phishing Incident Response

Low Appetite for Long Security Training? Use a Bite Sized Approach

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/nanolearning%20blog.png?width=300&amp;name=nanolearning%20blog.png" alt="nanolearning blog" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">Although computer-based training has been on the scene for over two decades, it is only recently that learning professionals
Publish At:2019-09-19 22:40 | Read:205 | Comments:0 | Tags:security awareness training nanolearning

Phishing Simulations: Should they Reflect Real-World Attacks?

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Real%20World%20or%20Nah_.png?width=300&amp;name=Real%20World%20or%20Nah_.png" alt="Real World or Nah_" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">As the manager of a security awareness team, whose primary goal is to educate users on how to spot phishing attack
Publish At:2019-09-19 22:40 | Read:275 | Comments:0 | Tags:Phishing Simulation security awareness training

Six Steps to Train Your Users to Fight Cybercrime

<p><img alt="Fight cybercrime" src="http://info.phishlabs.com/hubfs/blog-files/Miyagi.jpg" style="width: 363px; float: right;" title="Fight cybercrime" width="363"></p> <p>Stopped in traffic on my commute home it hit me…(not the person texting and driving) but the idea that I’d just been miyagi’d!</p> <p>Every day I ha
Publish At:2016-04-07 14:45 | Read:2583 | Comments:0 | Tags:Employee Defense Training security awareness training EDT

5 Tips for Evaluating Phishing Simulation Solutions

<p><strong><em><img alt="scale.png" src="http://info.phishlabs.com/hubfs/blog-files/scale.png" style="width: 243px; float: right;" title="scale.png" width="243"></em></strong></p> <p><strong><em>Setting up an effective security awareness training program</em></strong></p> <p
Publish At:2016-02-19 06:25 | Read:2560 | Comments:0 | Tags:T2 Employee Defense Training security awareness training

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud