Skip to main content

The Evolution of Workplace Cyber Security

Information Technology Blog - - The Evolution of Workplace Cyber Security - Information Technology Blog

Hackers are savvier than ever. Just when security experts wise up to one scheme, cyber criminals devise another.

Business owners however, are taking the offensive against today’s greatest threat, phishing. According to both Symantic and Trend Micro over 90% of cyber-attacks begin with spear phishing emails. Let’s face it: Naive, untrained employees account for the greatest threat to a company’s security. Many employees do not even recognize the warning signs associated with spear phishing.

A colleague and I recently compared notes on the major security awareness training companies that one or both of us have either tried or looked into. Our findings are as follows:

KnowBe4

KnowBe4 is known for great phishing exercises and offers an extensive list of products and services. Some of its free tools, like the email exposure check and phish alert button, are fairly sophisticated. The founder has authored several books and knows just about everything there is to know about computers, the internet and cyber awareness.

What’s not to like?

The Chief Hacking Officer was a failed non-technical criminal “hacker” and twice landed in federal prison. At his initial arrest, he was found with dozens of cloned cell phones and several fake IDs. Charges brought against him included wire fraud, unauthorized access to a government computer and unlawfully copying software. By his own admission, he violated the terms of his supervised release by hacking into several systems without permission.
In short, he’s just about the last person on earth that I would trust to train our employees.

MediaPro

This training program is one of the best for ease of use and holding employees’ attention with bite-size learning content. It also emphasizes adaptability to changing needs.

Although MediaPro claims to have won a few industry awards, I found the video materials to be of very poor quality.

Phishme

This company takes a unique approach – empower your employees to become part of the solution. It offers self-monitoring tools and simulators that condition employees’ behavior.

It also provides generic, mediocre email spoofing templates so that you can attempt to trick your workers and see how they respond. The pricier managed service doesn’t look bad, but to our knowledge, PhishMe doesn’t employ professional, ethical hackers. We consider experienced professionals a must for a managed service.

Wombat Security Technologies

Wombat is fairly impressive. The four parts to its cyclical approach are assessment, education, reinforcement and measuring effectiveness. The program features interactive modules and is said to result in a 90 percent decrease in successful cyberattacks.

Another advantage is the professionalism of Wombat’s founders. They are highly educated leaders with years of experience in security.

PeopleSec

For a comprehensive, state-of-the-art security training program, PeopleSec is hard to beat.

It was founded by white hat hackers. They are degreed professionals who continually learn to stay ahead of the criminal hackers. With their background, I would have no problem trusting them with confidential information and the ethical training of our employees.
Here are other features of the PeopleSec program that wowed us:

  • Unique approach utilizing Pavlovian Techniques
  • Short Training, typically 1 minute or less
  • Professional, up-to-date materials
  • Comprehensive training that covers pertinent topics like password
    protection, social media behavior, Wi-Fi safety and malware prevention.
  • Artificial intelligence for things like mass customization

The company’s impressive client list includes government entities and high-profile corporations. Represented industries include oil and gas, industrial control, health care, gaming, finance, retail, software and telecommunications.

All things considered, PeopleSec leads the pack in cyber awareness training.

Republished by Blog Post Promoter

The post The Evolution of Workplace Cyber Security appeared first on Information Technology Blog.



Udimi - Buy Solo Ads from Information Technology Blog https://ift.tt/2CG1RDj
via IFTTT

Comments

Popular posts from this blog

9 VCs in Madrid and Barcelona discuss the COVID-19 era and look to the future

Spain’s startup ecosystem has two main hubs: Madrid and Barcelona. Most observers place Barcelona first and Madrid second, but the gap appears to close every year. Barcelona has benefitted from attracting expats in search of sun, beach and lifestyle who tend to produce more internationally minded startups. Madrid’s startups have predominantly been Spain or Latin America-focused, but have become increasingly international in nature. Although not part of this survey, we expect Valencia to join next year, as city authorities have been going all-out to attract entrepreneurs and investors. The overall Spanish ecosystem is generally less mature than those in the U.K., France, Sweden and Germany, but it has been improving at a fast clip. More recently, entrepreneurs in Spain have moved away from emulating success in pursuit of innovative technologies. Following the financial crisis, the Spanish government supported the creation of startups with the launch of FOND-ICO GLOBAL, a €1.5 billi...

Emulating USB Dongle – Introducing HASP Dongle Emulator Software

Information Technology Blog - - Emulating USB Dongle – Introducing HASP Dongle Emulator Software - Information Technology Blog Over the years the methods used by software developers and producers to limit the amount of users to a specific number in a licensing agreement have become more complex.  The aim of copy protection is to protect the intellectual rights and financial investment of the individual developers and manufacturing companies.   A way of getting around this protection is to reproduce the media through which you can deliver the application to other users,  meaning that the software can be replicated far in excess of that specified in the license. One of the most common methods has been to use hardware keys or dongles which will enable the user to activate an application, unlocking its full functionality without using a device.  In addition, it offers good protection against attempts to pirate the software. In this article, we will look at th...

Advantages and Disadvantages of using Vouchers in eCommerce

Information Technology Blog - - Advantages and Disadvantages of using Vouchers in eCommerce - Information Technology Blog To decide whether vouchers and coupons are the right tool to add to your online marketing strategy, it is essential that you consider the benefit and the cost of using coupons. In this article, we will use Gtech coupon marketing strategy as an example a successful coupon strategy.  Also check out these great books on coupon codes for ecommerce . Advantages of Using Coupons Increase Sales This is the obvious benefit. Coupons serve to increase sales especially for high ticket items such as luxury gadgets. Gtech discount codes is a good example as Gtech quality is reflected on the price of both the Gtech eBike and Gtech AirRam. In order to boost sales, the company releases 10% off offers certain times of the year when online sales would normally be low. Enlarge Email List Acquiring a customer can be expensive in terms of advertising and marketing. If yo...