Humans Are Notoriously Bad at Assessing Risk

November 22, 2023 at 07:12AM Risk assessment can be subjective and biased due to human emotions, which can lead to an inaccurate representation of reality and a weaker security posture. To remove subjectivity, security professionals should follow seven steps: identify critical resources and data, understand potential financial impact, enumerate relevant threats, map risks to resources, … Read more

The 7 Deadly Sins of Security Awareness Training

November 21, 2023 at 06:47PM Avoid these tactics when educating employees about risk. As an executive assistant, my role is to diligently and accurately generate clear takeaways from meeting notes. Based on the provided meeting notes, it is advised to avoid using these tactics when trying to educate employees about risk. It is recommended to … Read more

A Ukrainian Company Shares Lessons in Wartime Resilience

November 1, 2023 at 07:27PM MacPaw, a software company in Ukraine, has successfully maintained operations during the ongoing conflict with Russia. The company implemented several measures to ensure resilience, including creating an emergency team, prioritizing employee safety and customer service, fortifying headquarters, securing power and connectivity options, building hardware reserves, establishing redundant communication channels, staying … Read more

One Ukraine Company Shares Lessons in Prepping for Wartime Cyber Resilience

November 1, 2023 at 03:38PM The cybersecurity community is focusing on preparing for uncertainty amid the conflict in Israel. Vira Tkachenko, CTO of MacPaw, shares her experiences and offers insights into wartime cyber resilience. MacPaw created an emergency team, prioritized physical safety and security, hardened headquarters, bolstered power and connectivity options, built up hardware reserves, … Read more

Key Learnings from “Big Game” Ransomware Campaigns

October 26, 2023 at 12:21PM A recent report on crypto crime found that ransomware attacks are increasing in prevalence, targeting major industries such as casinos, manufacturing, retail, and technology. Organizations must take specific steps to address these attacks, including understanding the threat, identifying internal signs of attack, and strengthening infrastructure. Utilizing threat intelligence and effective … Read more