article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

28, 2023 – AppDirect , the world’s leading B2B subscription commerce platform, today released key findings from its IT Business Leaders 2024 Outlook Report. This demonstrates a lack of rigorous employee education and training on cybersecurity measures, making employees part of the problem rather than part of the solution. β€œIT

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats β€” as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron: Companies often underestimate threats, neglect basic cyber hygiene, and fail to educate employees on cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What the Email Security Landscape Looks Like in 2023

Security Affairs

Training users to be more aware. Education is a key element in building a culture of security, so it’s vital to get employees onboard when rolling out new standards and policies. About the author Ali Cameron is a content marketer that specializes in the cybersecurity and B2B SaaS space.

article thumbnail

Global CRM Provider Exposed Millions of Clients’ Files Online

Security Affairs

Researcher discovered that global B2B CRM provider Really Simple Systems exposed online a non-password-protected database with million records. Upon further research, records indicated that the database belonged to global B2B CRM provider Really Simple Systems.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Is there cybersecurity training on best practices, including setting strong passwords in accordance with the organization’s policy?

Security 100
article thumbnail

Spear phishing vs. phishing: what’s the difference?

IBM Big Data Hub

The phishing scam made news not only because of its sophistication—with one expert calling it “one of the more sophisticated long-form hacks in history”—but also because of Twilio’s unique position as a B2B company, servicing many other tech companies.

Phishing 107
article thumbnail

The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

We sought to train our students – tomorrow’s business leaders – to embrace the β€œBig Data MBA” concepts in creating digital transformation-based business models. To support this training, we created a methodology that guided the students through a digital transformation exercise. Captures β€œWhat Does Success Look Like?”