What Is Security Awareness Training?
Wombat Security Blog
by Gretel Egan
5y ago
Security awareness training has made great strides in terms of recognition and adoption over the past decade. As such, it might seem odd for us to dedicate a blog to defining this term. But our goal isn’t to define security awareness training at a basic level. Rather, it’s to encourage you to think beyond the basics. And part of that is considering how you define security awareness training for those who will determine the success of your program: your end users ..read more
Visit website
Are Your Out-of-Office Replies Revealing Too Much?
Wombat Security Blog
by Gretel Egan
5y ago
Whether you’re traveling for business or pleasure, it’s common practice to create an automatic out-of-office reply for incoming emails. While business continuity is important, it’s critical to remember that some emails that arrive in your inbox will come from people you don’t know—and, in some cases, cybercriminals who wish to do you harm. The details you provide could be used for malicious purposes and expose your organization to attack ..read more
Visit website
Are Your Users’ IoT Purchases a Security Risk?
Wombat Security Blog
by
5y ago
Infosec professionals, consumer advocates and the media frequently sound the alarm about the proliferation of Internet of Things (IoT) devices. Many of these devices have known vulnerabilities and do little to protect user data ..read more
Visit website
‘Beyond the Phish’ Report Examines End-User Cybersecurity Knowledge
Wombat Security Blog
by Gretel Egan
5y ago
We’re excited to announce the launch of the 2019 Beyond the Phish report, our fourth-annual look at the cybersecurity knowledge levels of our customers’ end users. This year’s report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications ..read more
Visit website
Attack Spotlight: Phishing Emails Mimic Real Banking Messages
Wombat Security Blog
by Gretel Egan
5y ago
Proofpoint researchers are warning of a phishing trend that uses well-known banking brands to trick users into compromising business and personal banking accounts. Our latest Attack Spotlight, available now, provides free, timely content you can immediately share with your end users to help them avoid these types of phishing attacks ..read more
Visit website
The Latest in Phishing: May 2019
Wombat Security Blog
by
5y ago
We bring you the latest in phishing statistics and attacks from the wild. Phishing Statistics and News  $1.2B Lost to Business Email Compromise and Email Account Compromise Phishing and other email-based attacks were top concerns in the 2018 Internet Crime Report, recently issued by the U.S. Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3). Last year, the IC3 received 20,373 complaints of business email compromise (BEC) and email account compromise (EAC), with adjusted losses of more than $1.2 billion. The report notes that these attacks have grown increasi ..read more
Visit website
USB Attacks: How Do You Counteract Curiosity?
Wombat Security Blog
by
5y ago
USB removable storage drives have been around for nearly two decades, as have concerns about how cyber criminals can use these small, inexpensive devices to spread malware and secretly steal data from protected networks. By now, you might think the average person knows better than to pick up a strange USB drive and plug it into their computer, but that’s not necessarily true. Despite warnings from infosec professionals and the media, end users’ natural curiosity and other emotions still make them vulnerable to USB-based social engineering ..read more
Visit website
Learning Science and Security Awareness Training: Connection Is Key
Wombat Security Blog
by Gretel Egan
5y ago
Question: How do you learn? It may seem like a broad query with many answers … and different people do learn in different ways and at different paces. But there is (fairly) universal agreement on one aspect: It’s nearly impossible to learn new skills without regular practice and reinforcement ..read more
Visit website
A
by
ago
A ..read more
Visit website
A
by
ago
A ..read more
Visit website

Follow Wombat Security Blog on FeedSpot

Continue with Google
Continue with Apple
OR