Training employees to resist the lure of phishing, scams, and deepfakes is central to a good cybersecurity posture, but to be effective it needs to be handled with plenty of input and guidance from ...
Let me preface this with an attempt at a story: Sarah’s eyes darted across the email subject line, which read: “URGENT: Payment Needed – Action Required”. It was 4 p.m. on a Friday, and the CEO’s name ...
Every employee needs to be aware of cyber security risks and the basic actions they may need to take, such as correctly reporting suspected phishing attacks. Others, including IT staff, need more ...
To protect the integrity of research and safeguard sensitive information, institutions are increasingly prioritizing research security. All personnel involved in research activities—whether faculty, ...
The Computing Technology Industry Association reports that security training for your IT staff pays in the form of fewer security breaches that affect operations. According to CompTIA’s survey, 46% of ...
First things first. All active employees at the university are required to comply with university information security policies. You can access and read them by visiting the university Policy Library.
Creating and maintaining a comprehensive training program increases the likelihood that employees have the necessary insight to identify potential attacks. A knowledgeable, well-staffed security team ...
What’s the one area in cybersecurity that is overdue for change? It's security awareness training. After three decades of underwhelming results, it’s clear that ...
In the summer of 2021, analyst Gartner published its Market guide for security awareness computer-based training. It reported that the human element (85%) continues to be a primary catalyst for data ...
Research Security & Integrity (RSI), in partnership with the Office of Contracts and Grants (OCG), has established processes and procedures to comply with the research security training requirement ...
Security awareness programs aren't keeping up. Let’s start with the hard truth: Despite billions spent on cybersecurity tools and infrastructure, the number one ...