Recently I was part of a panel discussion on combatting ransomware at the SecureWorld Atlanta event. An interesting conversation developed around the old stalwart of patching computers and systems. A solid patching process is one of the most elementary parts of an organization’s security program — or at least it should be.
Security Awareness Training Programs
Not sure which assessment and education components to select for your security awareness training programs? Our suggested programs identify Wombat products that will help you use our unique, four-step Assess, Educate, Reinforce, Measure methodology as the foundation of an effective security awareness training program.
The Anti-Phishing Training Suite combines simulated phishing attacks, our unique Auto-Enrollment feature, and three interactive training modules to help you reduce phishing risks. Customers have reduced their quantity of successful phishing attacks by up to 90% using our proven Anti-Phishing Training Suite.Learn More ›
How well do your employees understand the basic principles behind compliance initiatives? We cover PII, PHI, and PCI-DSS topics. Don’t just check the box with your compliance training. Choose a program that allows you to evaluate knowledge and use interactive training to drive behavior change.Learn More ›
Healthcare data is one of the most valuable items to cybercriminals and often healthcare settings are easy targets because of their own unique time and security challenges. Use our healthcare-focused assessments and short, interactive training to build an effective security awareness and training program to keep your staff and patients safe.Learn More ›
Social engineering is often the first step in many other types of attacks. Use our CyberStrength assessments and simulated attacks to evaluate susceptibility, and follow with training modules that help your users identify social engineering scams and react appropriately.Learn More ›
Data Storage & Handling
Data is everywhere and more mobile, giving more potential access points to criminals than ever before. Assess your users’ knowledge and then educate them on how to safely use, transport and store sensitive data.Learn More ›
Theft, loss, and damage to mobile devices is no small problem; portability means that sensitive data is constantly on the move. Assess your user’s knowledge and educate them with our interactive training modules specific to this important topic.Learn More ›
Retail organizations have long been targeted by cybercriminals, who seek all opportunities to breach networks and systems in hopes of obtaining credit card, banking, and personal information. Assess your user’s knowledge and educate them with our interactive training modules specific to this industry.Learn More ›
Wombat Security Blog
User Risk Report Shows Marked Lack of Security Awareness Among Workers
Earlier this week, we released our 2017 User Risk Report, which features the results of a survey of more than 2,000 working adults — 1,000 in the US and 1,000 in the UK — who were asked about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying — but always enlightening.
An interesting note before you dive into the highlights below: Our survey concluded less than 24 hours before the first reports of the global WannaCry ransomware attack began to spread. As such, the responses of the participants were not influenced by the increased media exposure that resulted from WannaCry.
Ransomware and Phishing Attacks: Why Anti-Virus Software Can't Save You
Installing and keeping anti-virus software up to date on computers and mobile devices has become a de facto cybersecurity best practice — and for good reason. Like other technical safeguards, anti-virus software has come a long way in its sophistication since its early days in the late 1980s and early 1990s. There are many reliable and reputable options for anti-virus and anti-malware protection for corporate organizations and personal devices, and they provide an important layer of security for data, devices, and systems.
But you cannot count on them to stop ransomware infections, and they absolutely cannot prevent phishing emails from reaching your inbox.
Five Tips from CISOs for Managing Emerging Cybersecurity Threats
I recently had the opportunity to visit SecureWorld Atlanta 2017, where I met a number of industry experts and attended several sessions. One of those sessions was a panel discussion titled, “Hazards on the Horizon – Emerging Threats.” The panel of CISOs discussed both the current cyber threat landscape and offered advice for keeping networks and systems as secure as possible during this era of frequent cyberattacks. Each of the five panelists was asked to provide their one key piece of advice. Here’s what they said: