article thumbnail

Free resources to help you prevent and respond to data breaches

IT Governance

Conducting a Data Flow Mapping Exercise Under the GDPR : Data mapping is an essential part of information security, helping organisations discover where information is held and which areas are vulnerable. Green papers. This green paper explains each requirement and how you can comply. Videos, blogs and podcasts.

article thumbnail

Watch out for scams as Brexit confusion intensifies

IT Governance

Brexit is clearly a pressing issue for many organisations, but we urge you to exercise caution whenever you receive communications out of the blue relating to the UK’s departure from the EU. The course content is updated quarterly to provide the latest real-world examples of phishing emails.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spear Phishing Prevention: 10 Ways to Protect Your Organization

eSecurity Planet

Individuals and organizations should prioritize security awareness training, implement email security measures, and encourage vigilance when dealing with unusual or urgent requests. How Spear Phishing Works Spear phishing requires significant research on the part of the attacker for it to be successful.

article thumbnail

Organisations ignore cyber security staff training in favour of unnecessary technological solutions

IT Governance

Many managers appear to be stuck in a cycle of assuming that technology is the best solution, reasoning that more tools means their organisation will be more secure. For example, layering one anti-malware solution on top of another will not make an organisation significantly more secure.

article thumbnail

What Is Penetration Testing? Complete Guide & Steps

eSecurity Planet

Pentesters, posing as red teams, may previously inform the blue team, or security team, about the nature of the simulation, or they may not. Red-blue team strategy allows security teams to learn what actual attacks look like and measure their response and performance.

article thumbnail

Intro to phishing: simulating attacks to build resiliency

Security Affairs

This article will provide some insights into current phishing methods cyber-criminals leverage to exploit human behavior, performance metrics useful for measuring organizational resiliency to phishing, and examples of free tools that can be leveraged to conduct internal simulated phishing exercises.

article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

This latest impersonation campaign makes the case for ensuring users are vigilant when interacting with the web – something accomplished through continual Security Awareness Training. To ensure that you get the most recent security fixes, enable automatic updates whenever possible."