Blog

AT&T Breach
AT&T Breach: 3 Human Factors Exposed
Discover the human errors behind the AT&T breach and learn how to protect your organization from similar vulnerabilities. Explore key lessons in cybersecurity that can prevent future incidents
Continue Reading
Cybersecurity: companies that made it too easy for hackers.
My accountant made it too easy for hackers to steal my data, and so did these three big companies.
How my accountant's negligence with her clients’ password relates to similar mistakes by Sony, Verizon, and Facebook that led to major cybersecurity breaches. Learn essential tips to avoid these common pitfalls, protect sensitive information, and keep your team engaged in cybersecurity.
Continue Reading
Employee IRS tax scams
Five Tips to Prepare Your Employees for 2024’s IRS Tax Scams
Learn how to protect your business from IRS tax scams with these proactive tips for CISOs. Discover the latest tax scam threats, statistics, and expert advice to keep your employees safe from phishing emails and IRS impersonation. Stay ahead of cybercriminals with awareness campaigns, early tax filing, IP PINs, password protection, and more. Plus, get a bonus tip to safeguard your finance and HR personnel against CEO impersonation scams.
Continue Reading
data privacy
Data privacy: 4 online retailers that are spying on your employees during work hours
Online retailers are tracking your employees' every move, collecting a vast amount of personal information that can be used for marketing purposes or even sold to third parties. See how this impacts your company's data privacy.
Continue Reading
CISO made a mistake
How Cognitive Bias Affects CISOs and Other Cybersecurity Professionals
Cybersecurity professionals, including CISOs, are not immune to the pitfalls of cognitive bias. This article explores how these biases can lead to mistakes, such as falling for phishing scams, and provides tips for overcoming these biases. It also discusses the solitude of a leader in cybersecurity and how pressure can influence decision-making.
Continue Reading
Five Reasons Why Your Cyber Security Training for Employees Falls Short
5 Reasons Why Your Cyber Security Training for Employees Falls Short
Discover the reasons behind ineffective employee cyber security training and how to transform it into an engaging and impactful program.
Continue Reading
worried about recession and cybersecurity
Recession and the Role of Cybersecurity
A looming recession increases risks of attacks and scams. Why you should take the pro-active route and turn cybersecurity into an investment, not a cost.
Continue Reading
Case study: How a Man-in-the-middle attack caused over $700 million in losses!
Criminals exploited a patched vulnerability to deploy a man-in-the-middle attack to gain access to multiple databases of one of America’s biggest credit reporting agencies and steal the personal information of 147 million citizens
Continue Reading
Cybersecurity Awareness Month Special: Cybersecurity by the Numbers
This cybersecurity awareness month, et a clear picture of the digital landscape with 2023's most unsettling cybersecurity statistics: frequency of attacks, costs, contention time, most dominant threats, the role of employees, and much more.
Continue Reading
Annual Cybersecurity Training vs. Year-Round Cyber Security Awareness: Which is Better?
I have worked for not one, but three Fortune 500 companies, and the approach to cybersecurity training is typically as follows: Once the training is over, you drag yourself back to the office, and by the time you've sat down, it feels like half of all that information is GONE! A Snapshot of Traditional Cybersecurity […]
Continue Reading
The Evolution of the CISO 
The article discusses the changing role of the CISO, highlighting the importance of balancing business strategy and cybersecurity, and exploring future trends in the profession.
Continue Reading
CISOs know the rules of password management, employees often do not
Employees of clients who distribute Aware Force e-news have more questions about password management more than any other cybersecurity topic.
Continue Reading
usermagnifiercrossarrow-right linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram