The Ultimate Guide To Protecting Against Phishing Attacks (Free PDF)
Cyber Risk Aware Blog
by Marketing Titan
1y ago
Phishing Awareness: The Ultimate Guide To Protecting Against Phishing Attacks (Free PDF) The use of technology is an inescapable component of modern business operations. From manufacturing to marketing, sales to finance, and every aspect of communications therein, technology plays an ever-increasing role. Yet the risks associated with technology are well known. A recent report in the Atlantic found that 92% of IT firms have reported attacks on their clients’ systems. The dangers of leaving computers unprotected and their respective systems and data vulnerable, have cost companies millions of ..read more
Visit website
Ask a simple question and save thousands!
Cyber Risk Aware Blog
by Stephanie Wills
1y ago
Ask a simple question and save thousands! A true story: When hackers go ‘whaling’ they know that most people are too nervous to ask the simplest of questions. “What shocked me the most,” said the CEO of a major firm, “was that no one thought it sensible to just personally ask me or the Financial Director about those demands for immediate payment!” And the question he wanted to be asked? ‘Did either of you authorise this really big payment to a supplier?’   The CEO and the Financial Director were ‘whales’ – important officers in an organization who had not only the authority to aut ..read more
Visit website
Protected: Test ROI
Cyber Risk Aware Blog
by Daragh Mulvey
1y ago
This content is password protected. To view it please enter your password below: Password: The post Protected: Test ROI appeared first on Cyber Risk Aware ..read more
Visit website
The Ultimate Guide To Security Awareness Training (Free PDF)
Cyber Risk Aware Blog
by Marketing Titan
1y ago
The Ultimate Guide To Security Awareness Training (Free PDF) The use of technology is an inescapable component of modern business operations. From manufacturing to marketing, sales to finance, and every aspect of communications therein, technology plays an ever-increasing role. Yet the risks associated with technology are well known. A recent report in the Atlantic found that 92% of IT firms have reported attacks on their clients’ systems1. The dangers of leaving computers unprotected and their respective systems and data vulnerable, have cost companies millions of pounds per year. Therefore ..read more
Visit website
The future of human cyber risk management and security awareness education
Cyber Risk Aware Blog
by Stephanie Wills
1y ago
The future of human cyber risk management and security awareness education A discussion with Professor Phil Morgan, Director of the Human Factors Excellence Research Group (HuFEx) at Cardiff University and the Technical Lead in Cyberpsychology and Human Factors and the Accelerator in Human-Centric Cyber Security at Airbus   Click here to register for the People Matter webinar with Phil Morgan on 13 January 2022. Topic: Applying behavioural science to security behaviours Nick Wilding – Chief Innovation Officer at Cyber Risk Aware Last week I spoke with Professor Phil Morgan about h ..read more
Visit website
Cyber Risk Aware Announces Acquisition by TitanHQ
Cyber Risk Aware Blog
by Stephanie Wills
1y ago
Cyber Risk Aware Announces Acquisition by TitanHQ Dublin, Ireland & London, England, Feb. 17, 2022, Cyber Risk Aware, a global leader in security awareness and mitigation of human cyber risk, today announced that it has been acquired by TitanHQ, the leading cybersecurity SaaS business.   TitanHQ is a 20-year-old multi-award-winning cybersecurity business that protects end users in over 8,500 businesses and 2,500 MSP partners. The TitanHQ secure platform protects client users from malware, ransomware, phishing, viruses, botnets and other end user compromises.   The acquisition ..read more
Visit website
Hackers want you to be boring
Cyber Risk Aware Blog
by Stephanie Wills
1y ago
Click here to listen to Nick and Jerome discuss stories and cybersecurity training in our short podcast on YouTube. Hackers want you to be boring Why bullet points won’t protect your enterprise By Nick Wilding and Jerome Vincent How does this grab you? Memo: Re RPA Device/Machine Identity The need to protect individual and machine identities is urgent API’s and bots given privileges are a source of threat RPA approval bots automating invoice approval credentials must be updated on a regular basis Bots can be hacked, so please review credentials Click here for detailed o ..read more
Visit website
Cyber Risk Aware’s Security Behaviour Change Training Platform Now Available in the Microsoft Azure Marketplace
Cyber Risk Aware Blog
by Stephanie Wills
1y ago
Cyber Risk Aware’s Security Behaviour Change Training Platform Now Available in the Microsoft Azure Marketplace Microsoft Azure customers worldwide can now gain access to Cyber Risk Aware’s security behaviour change training platform to take advantage of the scalability, reliability and agility of Azure to drive application development and shape business strategies. 15 December 2021, Dublin & London: Cyber Risk Aware today announced that its human cyber risk management and behaviour change platform is now available in the Microsoft Azure Marketplace, an online store providing applica ..read more
Visit website
Do our employees really need more cyber security awareness training?
Cyber Risk Aware Blog
by Stephanie Wills
1y ago
Do our employees really need more cyber security awareness training? We all know the answer to the question. There is no shortage of security advice, guidance, dos and don’ts and directives for any employee. But the language often continues to confuse, the advice is often not related to the daily priorities that we all face in our busy working lives and there is often no real clue why and how the impact of adopting different measures will positively impact you.   We need a different approach. It’s not that we need more or different advice, it’s the way we listen to and communicate wi ..read more
Visit website
Who will get the Black Friday and Cyber Monday bargains?
Cyber Risk Aware Blog
by Stephanie Wills
1y ago
Who will get the Black Friday and Cyber Monday bargains?  Stop, think and be safe! Joe and Izzy couldn’t wait for Black Friday and Cyber Monday. They’d been planning what they were going to get for weeks. It was going to be the perfect start to the Christmas period and their next bonanza! It was simple to design their best online targets – to be the first to the gifts awaiting them.   Sadly, for many people, their shopping plans would be ruined. Joe and Izzy were part of a seriously organised criminal gang who were planning multiple cyber-attacks targeting us at a time when many ..read more
Visit website

Follow Cyber Risk Aware Blog on FeedSpot

Continue with Google
Continue with Apple
OR