
5 types of Insider Threats
Insider breaches — those caused by employees and leaders within an organization — are among the costliest and hardest to detect of all data breaches.
Insider breaches — those caused by employees and leaders within an organization — are among the costliest and hardest to detect of all data breaches.
Everyone knows how crucial security is and how it must be embedded into everything an organisation does. A simple glance at the news provides details
Addressing human risk, compliance and appropriate controls isn’t as easy as just doing some email phishing, some training and then some more phishing. Many companies
Protecting critical data does not stop at securing the devices on your network or even the employees of your company. In an increasingly complex environment,
Layer 8 Security is warning everyone to be wary of scammers trying to ruin their Christmas holidays. Scammers often try to take advantage of people
What is security awareness? It’s the ability to directly know and perceive, to feel, or to be cognisant of events. More broadly, it is the
Everyone has a clean desk, right? And there is no security concerns with having a messy, untidy or cluttered desk, right? Maybe, you clean your
We all have a multitude of local and online accounts that require username and passwords. We all hate passwords. Either you can’t remember them, or
“Change is so damn tough, you can’t possibly imagine how tough it is and how incapable most of you are to change.” That’s how Keith
I’m sure you heard the theme many times over the past few years that the best ROI for cybersecurity spend, comes from investing in your