Contact Info

Mobile: +31 6 3166 3374

Web: Security Awareness App

Yearly Archives: 2016

/2016

The forgetting curve of Herman Ebbinghaus

The Forgetting Curve of Herman Ebbinghaus German psychologist Hermann Ebbinghaus, a pioneer in educational psychology research, is considered the discoverer of the classical forgetting curve. He discovered that newly learned things could be fully reproduced, but as time passed, could ever reproduce less knowledge. In addition, he discovered that this curve eventually leveled [...]

By | October 24th, 2016|awareness, awareness training, Security Awareness App, security awareness training, security training, Training|Comments Off on The forgetting curve of Herman Ebbinghaus

Research Confirmed More Security Awareness Training required

Research Confirmed: More Security Awareness Training required At the Black Hat USA 2016 conference in Las Vegas earlier this month, Thycotic, a specialist in privileged account management (PAM) solutions, surveyed more than 250 attendees who self-identified as hackers (respondents remained anonymous). Hackers believe no password is safe from a determined attacker, but they agree that [...]

By | August 30th, 2016|awareness, security, Training|Comments Off on Research Confirmed More Security Awareness Training required

Security Training at Most Companies is Woefully Lacking

Security Training at Most Companies is Woefully Lacking Human error and lack of internal security awareness are the biggest sources for data breaches and risk to organizations. Yet 78% of SMBs conduct security training just once a year (or less). According to Shred-it’s 2016 Security Tracker survey (conducted by Ipsos), US companies are failing to [...]

By | August 22nd, 2016|awareness, Geen categorie, security, Training|Comments Off on Security Training at Most Companies is Woefully Lacking

How to secure your small business against data breaches and hacks.

How to secure your small business against data breaches and hacks. E-commerce and security experts offer 10 tips for preventing security breaches, hacks and security of customer data. Cybersecurity - and security breaches of systems- remains a hot topic. SMEs and e-commerce companies, especially those that use an open source platform, are particularly susceptible [...]

By | August 3rd, 2016|awareness, security, Security Awareness App|Comments Off on How to secure your small business against data breaches and hacks.

Whaling an other form of phishing?

Whaling? Whaling, the phenomenon you're likely better known than the word itself. Whaling is another form of phishing in which it does not involve the retrieval of data, but rather to carry out an action such as activating a payment. The procedure is as follows: A so-called familiar or executive from the management will contact [...]

By | August 3rd, 2016|awareness, security, Security Awareness App, Whaling|Comments Off on Whaling an other form of phishing?

Whaling an other form of phishing?

Whaling? Whaling, the phenomenon you're likely better known than the word itself. Whaling is another form of phishing in which it does not involve the retrieval of data, but rather to carry out an action such as activating a payment. The procedure is as follows: A so-called familiar or executive from the management will contact [...]

By | July 8th, 2016|awareness, phishing, security, Security Awareness App, Whaling|Comments Off on Whaling an other form of phishing?

Continuous Security Awareness Training

Continuous Security Awareness Training Security awareness programs are designed to educate users on the security policy of an organization. The goals for a security awareness program should include not only education about the organization’s security policy but should help to foster an understanding of how the policy protects the business, the employee, and customers. Training system administrators, IT [...]

By | July 5th, 2016|awareness, security, Security Awareness App, Training|Comments Off on Continuous Security Awareness Training

However our users would never do such a thing!

However our users would never do such a thing! Risks also come from within! Many breaches occur as a result of compromised user accounts. Risks can spread like wildfire in the dynamic traditional, virtualized and cloud environments that are used today in organizations.  One wrongly widely used authorized account can cause irreparable damage to [...]

By | June 30th, 2016|awareness, information security, Insider Threats, security|Comments Off on However our users would never do such a thing!

How effective is your investment in IT security?

How effective is your investment in IT security? Organizations have invested a huge amount of money and resources in securing the technology, but little or nothing to protect their employees and staff. Consequently, its employees, and not technology, have become the weakest link in cybersecurity. The most effective way to influence the human element is [...]

By | June 29th, 2016|awareness, security, Security Awareness App|Comments Off on How effective is your investment in IT security?

Opening Blog Information Security

Information security is changing very rapidly. - Opening Blog Information Security - Dear customer, Security of IT systems in your enterprise is threatened, while the attackers are becoming more inventive and ruthlessly act for personal gain or disrupting your business. This is not a local but a global phenomenon. The attention to this matter must [...]

By | June 28th, 2016|awareness, information security, security|Comments Off on Opening Blog Information Security