Don’t Miss This Important Panel Discussion at the GSX Conference in Las Vegas – What Are You Doing to Protect the Critical Infrastructure? Tuesday, 25 September| 2:00 PM – 3:00 PM | N117 Every U.S. citizen has a role to play in protecting the nation’s critical infrastructure. Almost daily, citizens are being targeted in cyber attacks by terrorist… Read more »
Fake news articles have become a hot topic in the political arena recently. However, accusations of fake news articles have been around since the 1950’s with tabloid gossip magazines like the National Enquirer. Over the years, numerous print magazines have been accused of publishing sensationalized false news articles about celebrities for the simple purpose of selling more magazines.
Web sites like Snopes.com and other “fact checker” sites have been around since 1995 to help with the verification of “urban legends” and fake articles on the Internet.
Each organization’s security awareness training will, and should, be slightly different. In fact, putting your own spin on your training is an important way to highlight specific elements of your corporate culture. Still, there are a few common threads that run through all of the most successful training programs. Here are the top 8… Read more »
Today marks the 50th anniversary of the assassination of Bobby Kennedy. I am finding it an opportune time to reflect upon my personal memories of history and how it shaped my future. We often do not realize that current events can have a huge impact on… Read more »
Social Engineering Scams One of the most effective and dangerous techniques criminals use to commit their crimes is called social engineering and it’s vitally important that you learn how to recognize this serious threat. Social engineering uses social interaction as the primary means to trick or persuade you to disclose confidential information that can then be… Read more »
Law Enforcement agencies not only serve as the first responders; they are entrusted to protect the public data they retain. Law Enforcement personnel must keep up with constantly changing cyber security crimes and vulnerabilities. New scams pop up every day and the Law Enforcement agencies are always in defense mode in their response. Currently, many… Read more »
Three Recommendations for IoT Security Criminals are now relying increasingly on ways to hack your devices. Each of us plays a responsible part in ongoing security awareness training and best practices to secure the Internet of Things – IOT. Staying current with the latest scams and sharing this information with your family, friends and co-workers… Read more »