Remove Subscribe
Remove Education Remove Examples Remove Government Remove Presentation
article thumbnail

How to Overcome Unconscious Bias in the Workplace

IT Governance

For instance, people might be judged on the clothes they wear, while our decisions can be manipulated based on the way information is presented. They often overlap, with a false assumption about someone affecting the way we treat them, for example. Contents What is unconscious bias in the workplace?

article thumbnail

How to Address AI Security Risks With ISO 27001

IT Governance

AI penetration tests, user education, and more Artificial intelligence is taking the world by storm. Just the person to talk to about: The impact of AI on security; User education and behavioural economics; and How ISO 27001 can help address such risks and concerns. For example, suppose a user has seen a list of passwords.

Risk 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The effects of phishing awareness training wear off over time

IT Governance

The findings, which were presented at the USENIX SOUPS security conference in August, were the result of a year-long investigation into the effectiveness of staff awareness training. This bundle also contains real-world examples of scams, explains the consequences of falling victim and explains how you can spot a scam and stay safe.

article thumbnail

Cyber Security in Banking: Threats, Solutions & Best Practices

eSecurity Planet

With vast amounts of sensitive data and financial transactions occurring daily, they present an attractive target for hackers. Real-world example: In 2024 , a sophisticated phishing network was dismantled after it targeted thousands of Australians, including customers of major banks.

Security 108
article thumbnail

Catches of the Month: Phishing Scams for July 2022

IT Governance

The organisation’s head of security, Cory Hardman, said that the breach occurred when an employee at a third-party email delivery vendor downloaded the details of OpenSea users and newsletter subscribers. Incidents such as this and the OpenSea hack demonstrate the challenges that NFT trading presents. Get started.

Phishing 114
article thumbnail

Key takeaways from the 2019 Verizon Data Breach Investigations Report

IT Governance

That Pinto uses the example of a senior employee is telling. The introduction of chip and PIN has made card-present fraud much harder, because even if crooks steal or clone a card, they don’t have the credentials to make payments over the counter. A similar trend is occurring in bank fraud.

article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

For example, when surveying the market for email security, survey results should include respondents from each category that might represent different needs. Organization type: corporate, education, utility, non-profit, government International regions: Asia, South America, North America, etc.