How a cyber escape room strengthens knowledge retention
People are your organisation’s first line of defence against cyber security threats, yet the training methods often leveraged fail to engage people properly. It is not enough to bring your team into a room and provide lectures or videos on recognising and defending against cyber security threats. I am sure many people, yourself included, spend... Learn More
3 reasons to involve HR in your cyber security initiatives
I wholeheartedly believe that cyber security has become the responsibility of everyone in an organisation. Many people now work with digital systems, handle sensitive information or connect to the internet when completing their work. Though it remains everyone’s responsibility, which people should lead these initiatives? Your HR team is one group that should help with... Learn More
Dark Web Price Index 2020
The dark web has a longstanding reputation as a haven for the worst kinds of criminal activity. This reputation is not wholly unjustified, as there are indeed terrible things happening around the world that can be bought and sold on the dark web. The privacy offered by software such as TOR creates an environment where... Learn More
7 Key Takeaways from the IBM Cost of Data Breach Report 2020
Here are seven key takeaways from the IBM cost of data breach report 2020. 1. Remote Work Increases Incident Response Time This pandemic has forced many businesses to embrace the remote work trend. There are many advantages of remote work and no one can deny that, but there are also downsides which most businesses... Learn More
Notifiable Data Breaches Report: July–December 2020
Notifications 539 Up 5% Malicious or criminal attack 58% Down 1% to 310 Human error 38% Up 18% to 204 System fault 5% No change An alarming statistic from this report is the 18% increase in Human Error. People unintentionally causing a breach. Often these errors are due to inattention, distraction or simply not caring enough... Learn More
What does Layer 8 Security provide?
Cyber Security Baseline – Human Gap Analysis The Cyber Security Baseline enables you to know and measure your staff risk. The Baseline provides you with an understanding of your staff security behaviour, and what are their strengths and weaknesses pertaining to cybersecurity awareness. The Baseline report allows you to target your staff with exactly what... Learn More
Phishing Measurement Theory
How do you accurately measure the success of your security awareness phishing exercises? Simulated phishing exercises are a great way to identify current behaviour when staff are presented with social engineering attacks. They are presented with real-life situations that a cybercriminal might target them with. After this, put the staff through some security awareness training... Learn More
Security awareness Training and Facilitated Learning
Facilitated Learning -Security Awareness Training When people mention Security Awareness Training, let’s be honest, no one ever woke up in the morning, excited about the need to do a security awareness training course at work. One of the problems is, to them it’s boring, irrelevant, and uninteresting. As such, staff want to get through the... Learn More
Sobering Password Facts
The human factor can be the weakest and the strongest link in any security posture. As fallible humans, we reuse passwords. We’ve all done it at one time or another. Most people are just out there working away with the same password across many of their accounts. If you use the same password for multiple... Learn More
Have I been Hacked?
It’s not a secret that hackers don’t make victims aware of the fact that they have hacked. And that’s not without reason. This might sound obvious, but just because everything “seems to be fine” doesn’t mean that’s actually the case. Hackers penetrate systems and infect them with malware to take full control. The malware created... Learn More