ERMProtect Cybersecurity Solutions Launches New Security Awareness Training Content

Benzinga | April 18, 2019

ERMProtect Cybersecurity Solutions Launches New Security Awareness Training Content
ERMProtect, a leading cybersecurity firm, today launched new educational games that show employees how to work safely online so they minimize the risk of triggering an organizational data breach. The new offerings expand the company's expansive line up of animated chalkboard videos, digital games, cyber dictionaries, phishing tests and quizzes that train employees to recognize hacker lures, so they are less likely to compromise sensitive data. "Spot the Phish" shows employees emails, on-line advertisements, sign-in links and another common Internet content. Employees must decide if they are real or phony. They receive detailed feedback on why their answers are right or wrong. The games teach employees to spot fake government emails, malicious ad solicitations, business compromise emails and dozens of other common scams targeted at them every day.

Spotlight

Cyber security attacks have increased exponentially in the last few years. Every day, as the rapid-fire evolution of technology marches forward, new, more complex cyber risks emerge, threatening significant harm to an organization’s brand and bottom line

Spotlight

Cyber security attacks have increased exponentially in the last few years. Every day, as the rapid-fire evolution of technology marches forward, new, more complex cyber risks emerge, threatening significant harm to an organization’s brand and bottom line

Related News

AI Is Critical for Automation of Cybersecurity Threat Detection and Prevention

IT web | May 26, 2020

In one form or another, artificial intelligence (AI) plays a role in the majority of technology today, and cyber security is no different. This capability has become critical in the ongoing war on cyber crime. As the potential for AI and machine learning is further explored. The threats are more sophisticated than ever before, and the use of deep learning and AI to breach security systems is becoming an increasing reality. In one form or another, artificial intelligence (AI) plays a role in the majority of technology today, and cyber security is no different. Anything that makes use of any form of behavioural analytics will inevitably require the use of algorithms for calculating probabilities, central to the ability to make predictive insight. This capability has become critical in the ongoing war on cyber crime. As the potential for AI and machine learning is further explored, we will see it taking a central role in automating threat detection and prevention, among other areas. One of the main reasons why AI has become critical in fighting cyber crime is that cyber criminals themselves are making use of it. The threats are more sophisticated than ever before, and the use of deep learning and AI to breach security systems is becoming an increasing reality. One example of this is called a deepfake, which uses AI to replace a person’s face or voice in a video – the implications of this are significant. In fact, there was an example of a successful deepfake attack in the UK in 2019, where criminals employed AI-based software to replicate a CEO's voice to execute a cash transfer of €220 000. Using AI, cyber criminals can also gather incredibly detailed personal information from the Internet and social media, allowing them to conduct ever more in-depth social engineering. AI could also be used to improve the success rate of phishing scams. These are currently fairly easy to spot because they typically display poor spelling and grammar, but using AI can dramatically improve this, and learning algorithms mean they will only get better. Learn more: HOW CSOS CAN PROTECT USERS FROM PHISHING ATTACKS RELATED TO COVID-19 . “AI is being used by cyber criminals, which means it is essential to counter any attacks. In addition, the ability to better predict threats before they happen and shut down attacks faster is central to enhanced cyber security, AI is beginning to play a major role in cyber security and this role will continue to grow and evolve through 2020 and in the future.” Added to this is the fact that AI can generate attacks far faster than any human could, so the potential of the threat cannot be ignored. Aside from countering AI-based threats with equally intelligent tools, AI has become critical in managing the sheer volume of attacks and potential attacks. With the number of attempted breaches constantly increasing, human cyber security teams have an increasingly challenging task when it comes to monitoring threats and determining which ones merit closer attention. According to the report: The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation: “Machine learning approaches are increasingly used for cyber defence” to learn from known threats and predict how new and future threats might manifest. ML is also used to detect suspicious behaviour and flag areas that may need closer attention. “AI has applications across networking and endpoint security products, threat detection and incident response, removing much of the human element, which is where the potential for error creeps in.” Trying to analyse and understand this vast amount of data in time to make a difference to counter the threat is impossible for humans alone. AI and machine learning can be effectively harnessed to automate these activities, sort through the millions of malware files, learn the characteristics of attacks and help to prevent new ones. AI can also be used to analyse voices and writing styles to ensure that people are who they say they are, for improved authentication. Focusing your attention in the right place .AI has applications across networking and endpoint security products, threat detection and incident response, removing much of the human element, which is where the potential for error creeps in. Automation is also essential in ensuring that software is patched and kept up to date with the latest malware signatures to shore up potential vulnerabilities. With the number of attempted breaches, it is all but impossible to protect against each and every one. It is vital to ensure that your most critical resources are adequately protected, but it is just as important to be able to respond to a successful breach effectively. Basic controls need to be in place and detection and response need to be improved to control the threat, shut it down and minimise the damage. AI is being used by cyber criminals, which means it is essential to counter any attacks. In addition, the ability to better predict threats before they happen and shut down attacks faster is central to enhanced cyber security. AI is beginning to play a major role in cyber security and this role will continue to grow and evolve through 2020 and in the future. Learn more: NEW CYBER THREAT INDEX SHOWS INDUSTRIES ARE UNDER ATTACK IN UNCERTAIN TIMES .

Read More

Unisys Secures Biometric Identity Management on Cloud with New Versions of Stealth(identity)™ Software

Unisys | July 21, 2020

Unisys Corporation (NYSE: UIS) today announced the availability of Unisys Stealth(identity)™ Software-as-a-Service (SaaS) 2.0 and Stealth(identity) 2.7, the latest versions of the company's biometric identity management software. Stealth(identity) is highly scalable and brings flexible biometric authentication and strong security to enterprises of any size, while the SaaS offering means protection capabilities are available either on premises or in the cloud.Stealth(identity) strengthens defense against identity fraud by establishing trusted and irrefutable identities of individuals across multiple physical and digital channels. It also provides comprehensive control of biometric management processes and the flexibility to adapt to and leverage advancements in technology to consistently stay ahead of cyber criminals.Identity theft has proven to be particularly problematic during the COVID-19 pandemic. According to the U.S. Federal Trade Commission, more than 124,000 complaints regarding fraud schemes related to COVID-19 have already been filed from consumers, with nearly half (48%) saying they lost money in a scam. And according to the 2020 Unisys Security Index™, the longest-running snapshot of consumer security concerns conducted globally, identity theft ranks as the top area of concern for consumers both globally and in the U.S.

Read More

Doble's Transient Cyber Asset Security Service a Hit among Top Electric Utilities, Demand Rises

Doble | July 01, 2020

Doble Engineering Company, a leader in power grid diagnostic solutions and subsidiary of ESCO Technologies Inc. (NYSE: ESE), today announced it has seen sustained growth in its Transient Cyber Asset (TCA) program. During the first half of 2020, the company achieved a record client renewal rate and strong customer acquisition growth, especially among the Fortune 500 and top electric utilities in the U.S.Doble's Transient Cyber Asset program is a comprehensive Managed Security Services (MSS) solution that supports electric utility field crews. As part of the offering, customers can choose from a range of rugged, special-purpose laptops or tablets, called Doble Universal Controllers (DUCs), or use their own transient devices. Doble's expert team hardens the devices to minimize cybersecurity risks and optimizes them for efficient field work. Doble's solution also includes remote management, 24/7 customer support, and compliance monitoring to ensure the devices remain secure and compliant to applicable regulations over their operational lifetime.Doble's Transient Cyber Asset program is growing due to the continuing evolution of the North American Electric Reliability Corporation's (NERC) critical infrastructure protection (CIP) cybersecurity standards. NERC CIP-003-8, which went into effect in January 2020, expanded transient cyber asset requirements to low impact substations, bringing many more power plants and utilities within scope of the security mandates.

Read More