training
![security awareness](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18071416/sec-awareness-400x200.jpg)
Security awareness training doesn’t solve human risk
Traditional employee risk mitigation efforts such as security awareness training and phishing simulations have a limited impact on improving employees’ real-world …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/31160326/email-smoke-blue-400x200.jpg)
Email security is a human issue
Research suggests that email is the most common point of entry for malware, providing access in 94% of cases, so it’s unsurprising that phishing is the root cause of 32% of …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093451/drown-400x200.jpg)
61% of cybersecurity teams are understaffed
The pandemic’s disruption has rippled across the globe, impacting workforces in nearly every sector. However, according to the findings from a survey report from ISACA and HCL …
![fake](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/05115557/fake2-400x200.jpg)
Social media feed simulator Fakey teaches users to recognize credible content
As people around the world increasingly get their news from social media, online misinformation has emerged as an area of great concern. Social media feed simulator Fakey To …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Use longitudinal learning to reduce risky user behavior
People ignore information that isn’t relevant to them, which is why IT and HR departments have been approaching security training incorrectly for years. Long-form, all-hands …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
Middle market companies facing a record number of data breaches
Middle market companies possess a significant amount of valuable data but continue to lack appropriate levels of protective controls and staffing, according to a report from …
![labyrinth](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105212/labyrinth-400x200.jpg)
IT security teams challenges fueled by record-setting cyberattacks
IT security teams faced unprecedented challenges last year fueled by dramatically expanded work-from-home (WFH) programs, increased bring-your-own-device (BYOD) policy …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
Attackers can teach you to defend your organization against phishing
People click on links and attachments and will, unfortunately, keep clicking even if they should know better. They’ll click for the chance of winning a holiday, or even …
![security awareness](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18071416/sec-awareness-400x200.jpg)
Five steps to get employees invested in security awareness training
Remote work has become a new normal for industries worldwide, which presents exciting opportunities but also has the potential to expose critical security weaknesses, since …
![light](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093257/light-400x200.jpg)
Having a cybersecurity training program in place isn’t enough to ensure cyber safety
With cyberattacks increasing dramatically after the pandemic, TalentLMS and Kenna Security teamed up to gauge employees’ awareness and knowledge of cybersecurity risks. While …
![cloud security experts](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25142237/cloud_security_experts-blue-400x200.jpg)
Cloud security experts wanted: You can be one of them
A recent study from Boston Consulting Group and analytics firm Faethm has attempted to predict how digitization and technology will upend labor markets in Australia, Germany, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092916/code1-400x200.jpg)
70% of organizations recognize the importance of secure coding practices
A research from Secure Code Warrior has revealed an attitudinal shift in the software development industry, with organizations bucking traditional practices for DevOps and …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD