Wombat Security is a leader in security awareness and training. Our blog covers the latest cyber security news, insights, and best practices. We arm infosec professionals with the knowledge and tools they need to improve end-user behaviors and reduce organizational risk.
Our 2018 Beyond the Phish® Report provides an in-depth look at end-user cybersecurity knowledge across 12 topics areas and 16 industry segments. Wombat's Amy Baker and Kurt Wescoe recently participated in a SecureWorld Behind the Scenes interview about this unique report. Listen in on the recording below to learn these (and other) valuable insights:
The Human Factor 2018 by Proofpoint, our parent company, is a report that cuts to the chase in its subtitle, “People-Centered Threats Define the Landscape.” A virtual treasure trove of information, the data revealed in the report make one thing crystal clear: end users are increasingly targeted within organizations, and cybercriminals are using human exploits to their advantage.
Physical security risks can have a significant impact on your organization’s ability to safeguard confidential information, secure locations, and even employees themselves. According to Verizon’s 2018 Data Breach Investigations Report (DBIR), 11% of confirmed data breaches during 2017 involved physical actions. This includes physical theft and loss, with paper documents and laptops the assets most likely to go missing.
This week, we released the 2018 edition of our Beyond the Phish® Report, an annual publication that analyzes data gathered from knowledge assessments and training challenges presented to our customers’ end users via our Security Education Platform. This year’s report analyzes nearly 85 million questions and answers related to 12 cybersecurity topics, and compares results across 16 industries.
Verizon recently released the 2018 Data Breach Investigations Report (DBIR), its annual analysis of the real-world security events that are impacting organizations around the globe. The report collected data from 67 contributing organizations, covering over 53,000 incidents and 2,216 confirmed data breaches.*
Last year, we added Awareness Video Campaigns to our selection of security awareness training tools in direct response to an interactive discussion with attendees at our 2016 Wombat Wisdom Security Awareness and Training Conference. Today, we are excited to announce the addition of a third series of videos — and companion posters and imagery — to our Security Awareness Materials portfolio that will help our customers continue to develop and execute engaging and effective cybersecurity education programs.
Mobile devices court risk on many levels, from malware to network compromise to outright theft. While many of these risks can be mitigated with technical solutions, one threat is extremely difficult (if not impossible) to control: the users themselves.
In our latest vlog segment, we explain why our trendsetting Continuous Training Methodology — which combines assessments, education, reinforcement, and measurement — helps organizations deliver more effective security awareness training. Watch now to learn why regular, ongoing cybersecurity education is critical to the reduction of end-user risk.
As you might already know from our Wombat Advantage program, we are very customer focused; we actively seek opportunities to engage with — and learn from — our customers, and we also actively ask for feedback from the program administrators who use our security awareness training products.
Read Full Article
Read for later
Articles marked as Favorite are saved for later viewing.
Scroll to Top
Separate tags by commas
To access this feature, please upgrade your account.