Information Security Awareness Training Video: "Phishing: E-Safe"

|

article image
The Higher Education Information Security Council (HEISC), along with EDUCAUSE and Internet2, held its annual Information Security Awareness Video & Poster Contest, an event that allows college students to win prizes, gain experience, and earn recognition by creating a PSA about information security.

Spotlight

Acuity Risk Management

Acuity Risk Management is the author of STREAM, an innovative risk and compliance software tool that can be quickly and easily configured to create a fully tailored enterprise risk and compliance management solution. Applicable to any business sector and for any type of risk, STREAM provides business managers with valuable ‘real-time’ visibility of risk and compliance status in relation to business targets and risk appetite. You can download our STREAM risk management software and training packs free of charge and get started. Using the free download you can configure your own GRC solution and use this on a single computer within your organisation and supply chain or to provide services to others. You can use the free download to develop and pilot your Enterprise GRC solution for specific management systems, such as information risk, IT governance, health & safety, environmental, business continuity and supply chain risk management. You can use STREAM Instead of spreadsheets for corpor

OTHER ARTICLES

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Article | March 17, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a lack of IT resources can bite many organizations as they move to enable remote strategies. And when workers and students are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge. Threatpost editors wanted to learn more about challenges and best practices from the IT and security professionals on the front lines of this. Please take a few minutes to take the Threatpost poll. The answers will be collected the results will be published in an article later this week.

Read More

5G and IoT security: Why cybersecurity experts are sounding an alarm

Article | March 17, 2020

Seemingly everywhere you turn these days there is some announcement about 5G and the benefits it will bring, like greater speeds, increased efficiencies, and support for up to one million device connections on a private 5G network. All of this leads to more innovations and a significant change in how we do business. But 5G also creates new opportunities for hackers.Gartner predicts that 66% of organizations will take advantage of these benefits and adopt 5G by 2020 — with 59% of them planning to use 5G to support the Internet of Things across their business. Already, manufacturers including Nokia, Samsung, and Cisco have either started developing 5G enterprise solutions or have publicly announced plans to do so. In the enterprise, full deployment of private 5G networks will take time, as it requires significant investments to upgrade legacy network infrastructures, observers say. In the meantime, there are instances of devices in the workplace already operating on a 5G network.

Read More

Progress Is the Promise in National Cybersecurity Strategy

Article | March 17, 2020

How can progress be measured when it comes to shifts in national security strategy and practice? Several assessment variables might include changes in official national guidance, legal authorities, types of campaigns or operations, lexicon used in national security discourse, and early results of the application of those changes. Since 2016, with the introduction of the construct of persistent engagement and the subsequent development of defend forward, all these variables have changed in a positive manner.

Read More

New Ransomware hitting Industrial Control Systems like a nuclear bomb

Article | March 17, 2020

Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or Snake, over the last month. Drago’s publically released its full report on Ekans Ransomware that has recently inflicted Industrial Control Systems and these are some of the most high-value systems that bridge the gap between digital and physical systems. In the history of hacking, only a few times a piece of malicious code has been marked attempting to intrude Industrial Control Systems. Ekans is supposed to be the first Ransomware with real primitive capability against the Industrial Control Systems, software, and hardware used in everything from oil refineries to power grids. Researchers say this ransomware holds the capability to attack ICS by Honeywell and GE as well.

Read More

Spotlight

Acuity Risk Management

Acuity Risk Management is the author of STREAM, an innovative risk and compliance software tool that can be quickly and easily configured to create a fully tailored enterprise risk and compliance management solution. Applicable to any business sector and for any type of risk, STREAM provides business managers with valuable ‘real-time’ visibility of risk and compliance status in relation to business targets and risk appetite. You can download our STREAM risk management software and training packs free of charge and get started. Using the free download you can configure your own GRC solution and use this on a single computer within your organisation and supply chain or to provide services to others. You can use the free download to develop and pilot your Enterprise GRC solution for specific management systems, such as information risk, IT governance, health & safety, environmental, business continuity and supply chain risk management. You can use STREAM Instead of spreadsheets for corpor

Events