Remove B2B Remove Education Remove Phishing Remove Training
article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

28, 2023 – AppDirect , the world’s leading B2B subscription commerce platform, today released key findings from its IT Business Leaders 2024 Outlook Report. In fact, all of their other concerns—malware, stolen data, phishing, ransomware and misconfiguration of cloud services—include an element of human error and/or malice.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron: Companies often underestimate threats, neglect basic cyber hygiene, and fail to educate employees on cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What the Email Security Landscape Looks Like in 2023

Security Affairs

Email Threats Are Becoming More Sophisticated There are a number of ways that email can be leveraged to compromise the security of an organization, but the most prominent approach is phishing. Today, according to the Verizon 2022 Data Breach Investigation Report , phishing is one of the leading five tactics used to initiate data breaches.

article thumbnail

Spear phishing vs. phishing: what’s the difference?

IBM Big Data Hub

The simple answer: spear phishing is a special type of phishing attack. Phishing is any cyberattack that uses malicious email messages, text messages, or voice calls to trick people into sharing sensitive data (e.g., Spear phishing is targeted phishing. What’s different about a spear phishing attack?

Phishing 110
article thumbnail

Global CRM Provider Exposed Millions of Clients’ Files Online

Security Affairs

Researcher discovered that global B2B CRM provider Really Simple Systems exposed online a non-password-protected database with million records. Upon further research, records indicated that the database belonged to global B2B CRM provider Really Simple Systems.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Is there cybersecurity training on best practices, including setting strong passwords in accordance with the organization’s policy?

article thumbnail

ROUNDTABLE: What happened in privacy and cybersecurity in 2021 — and what’s coming in 2022

The Last Watchdog

As developers’ data protection education advances, and as more data leaks and privacy violations occur due to faulty internal systems, we will start to see a growing understanding that, just like cryptography, most people should not be building their own privacy technologies. Security teams are realizing that training isn’t enough.

Privacy 235