article thumbnail

Upcoming webinar: Creating an effective cyber security awareness programme

IT Governance

Organisations run the risk of implementing staff awareness training that is seen as simply a tick-box exercise, which doesn’t often result in heightened awareness. An effective staff awareness programme should be an ongoing process that begins at induction and is reinforced by regular updates throughout the year.

article thumbnail

Free resources to help you prevent and respond to data breaches

IT Governance

The situation might seem hopeless, with cyber criminals outnumbering overworked and underfunded information security personnel, but there are plenty of ways you can improve your defences, even on a tight budget. IT Governance understands this. Green papers. This green paper explains each requirement and how you can comply.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 measures for good IT security governance

CGI

10 measures for good IT security governance. Adequate security and governance of information assets no longer can be achieved on an ad hoc basis, nor addressed by technology alone. I invite you to read more on this topic in our white paper on IT Security Governance. harini.kottees…. Wed, 02/15/2017 - 01:58.

article thumbnail

Podcast Episode 113: SAP CSO Justin Somaini and Election Hacks – No Voting Machines Required!

The Security Ledger

But an exercise in Boston last week showed how hackers can compromise the vote without ever touching an election system. Also: October is just around the corner and that means Cyber Security Awareness Month is upon us. So what are top cyber security professionals “aware of” these days? Read the whole entry. »

article thumbnail

NYDFS Amends Cybersecurity Rules for Financial Services Companies

Hunton Privacy

The proposed amendments now require a Covered Entity to address new issues in their cybersecurity plans, including data retention, end of life management, remote access controls, systems monitoring, security awareness and training, application security, incident notification and vulnerability management.

article thumbnail

CyberheistNews Vol 13 #14 [Eyes on the Prize] How Crafty Cons Attempted a 36 Million Vendor Email Heist

KnowBe4

Security solutions will help stop most attacks, but for those that make it past scanners, your users need to play a role in spotting and stopping BEC, VEC and phishing attacks themselves – something taught through security awareness training combined with frequent simulated phishing and other social engineering tests.

article thumbnail

Watch out for scams as Brexit confusion intensifies

IT Governance

Brexit is clearly a pressing issue for many organisations, but we urge you to exercise caution whenever you receive communications out of the blue relating to the UK’s departure from the EU. See also: Government surveys further education providers before Brexit.