How to create a sticky cybersecurity training program

Credit to Author: Jovi Umawing| Date: Thu, 08 Nov 2018 17:00:00 +0000

Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.

Categories:

Tags:

(Read more…)

The post How to create a sticky cybersecurity training program appeared first on Malwarebytes Labs.

Read more

It’s Everyone’s Job to Ensure Online Safety at Work

Credit to Author: Jon Clay (Global Threat Communications)| Date: Wed, 17 Oct 2018 13:05:17 +0000

As part of our effort to support National Cyber Security Awareness Month I wanted to provide information on the need for everyone within a business to be aware of their role in keeping the organization safe from cyber attacks.  Let’s discuss some of the areas where we see existing organizations employees may be lacking in…

The post It’s Everyone’s Job to Ensure Online Safety at Work appeared first on .

Read more

The BEC List: Helping Thwart Business Email Compromise through Collaboration

Credit to Author: Trend Micro| Date: Thu, 11 Oct 2018 19:30:01 +0000

Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has…

The post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on .

Read more

This Week in Security News: Tracking and Hacking

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 07 Sep 2018 11:30:46 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, Google revealed a secret deal with Mastercard that allows it to track what users buy offline. Also, Senate and House representatives warn that regulation may be coming for…

The post This Week in Security News: Tracking and Hacking appeared first on .

Read more

Stop Impersonations of Your CEO by Checking the Writing Style

Credit to Author: Chris Taylor| Date: Wed, 05 Sep 2018 19:25:23 +0000

If one of your employees receives an email that looks like it’s from the CEO asking to send sensitive data or to make a wire transfer, could that employee spot it as a fake based on how it is written? He or she may be so concerned with pleasing the CEO that they may urgently…

The post Stop Impersonations of Your CEO by Checking the Writing Style appeared first on .

Read more

BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

Credit to Author: Trend Micro| Date: Fri, 31 Aug 2018 15:34:48 +0000

For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack…

The post BEC is Big Business for Hackers: What makes these attacks so hard to prevent? appeared first on .

Read more

A week in security (July 16 – July 22)

Credit to Author: Malwarebytes Labs| Date: Mon, 23 Jul 2018 17:30:01 +0000

A round up of the security news from July 16 – July 22, including the release of our quarterly Cybercrime tactics and techniques report, breaches, airport security, bug bounties, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 16 – July 22) appeared first on Malwarebytes Labs.

Read more

Insider threats in your work inbox

Credit to Author: Malwarebytes Labs| Date: Fri, 01 Sep 2017 16:52:23 +0000

A new phishing campaign that targets businesses goes beyond business email compromise or CEO fraud.

Categories:

Tags:

(Read more…)

The post Insider threats in your work inbox appeared first on Malwarebytes Labs.

Read more