Monday, January 30, 2017

Compliance focus, too much security expertise hurts awareness programs

Trump's unsecure Android phone highlights common security dilemma

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Jan 30, 2017
Featured Image

Compliance focus, too much security expertise hurts awareness programs

Security awareness teams aren't getting the support they need to be successful, according to the SANS Institute. But some unexpected factors can cause programs to fail as well, including a focus on compliance -- and too much security expertise on the team. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Trump's unsecure Android phone highlights common security dilemma
Ransomware makes California nursing school feel ill
MongoDB ransom attacks continue to plague administrators
How to eliminate insider threats

Video/Webcast: Neustar Inc

2016: A Security Minefield - Will You Be Ready for 2017?

Ransomware. Politically-motivated hacking. Distributed denial-of-service - and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? Read More

Thumbnail Image

Trump's unsecure Android phone highlights common security dilemma

As CIOs and IT security pros already know, strong security technology can still be undermined if end users don't follow safe cyber practices. Read More

Thumbnail Image

Ransomware makes California nursing school feel ill

About three months ago, an instructor at Gurnick Academy, a California-based nursing school, had his biggest fear come alive. When he tried to access his lectures, the files were encrypted. The teacher was literally locked out of his classroom. Read More

Thumbnail Image

MongoDB ransom attacks continue to plague administrators

Earlier this month, Salted Hash reported on a surge in attacks against publicly accessible MongoDB installations. Since January 3, the day of that first report, the number of victims has climbed from about 200 databases to more than 40,000. In addition to MongoDB, those responsible for the attacks have started targeting Elasticsearch and CouchDB. Read More

Thumbnail Image

How to eliminate insider threats

Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company's network. Read More

White Paper: Neustar Inc

Cybersecurity Essentials for 2017

For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn't take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. Read More

Top 5 Stories

1. Your favourite VPN app is harvesting your personal information
2. Breach notification website LeakedSource allegedly raided
3. That online job candidate may be carrying a virus
4. IRS to delay tax refunds as a security precaution
5. 10 scary things the TSA found on your fellow travelers

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive