Remove Exercises Remove Information Security Remove Social
article thumbnail

4 methods to help CIOs manage cyber stress

CIO Business Intelligence

Seeing that hackers don’t work 9 to 5, IT and information security professionals generally don’t get enough rest, says Itumeleng Makgati, group information security executive at Standard Bank. Exercise empathy and compassion. The experts share their four top tips below. . Encourage your teams to slow things down.

article thumbnail

Critical Actions Post Data Breach

SecureWorld News

ISO 22398: Covers the principles of planning, conducting, and developing training programs to prepare teams for critical situations through practical exercises and simulations. Social engineering techniques enable them to bypass technical security measures effectively. ISO 22318: Dedicated to ensuring supply chain continuity.

Data 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Penetration Testing Remote Workers

SecureWorld News

Social media accounts associated only with personal, non-business usage. Vishing is another form of social engineering that targets users via telephone calls to landlines, cell phones, Voice Over IP (VOIP) phone systems and applications, and potential POTS (plain old telephone system) home phones. Social media. Remote access.

Social 92
article thumbnail

Mashing up Private and Public

Victus pro Scientia Opus -- Food for the Knowledge

As someone who is: active in several social media communities, . committed to helping clients think about how information is shared and secured, interested in current events (like the newly enacted Mass Privacy statute and well-publicized data security breaches), and. You may be surprised at what you find.

Social 50
article thumbnail

10 Top Ways: Building an Effective Cybersecurity Awareness Campaign

SecureWorld News

If these things are true, how do we share information with others in a way that is proven to work and create a culture of security? Security awareness and how you talk about cybersecurity. I can go into my [saved] folders, and find our folder on social engineering. social media safety. It's just not the case.

Survey 83
article thumbnail

Spotlight on Cybersecurity Leaders: Richard Staynings

SecureWorld News

However, as a student, despite being rather good at math in high school, I ended up perusing degrees in humanities, social sciences, and business. (My I came into IT from the side as a consultant and worked my way through IT infrastructure management before transiting to information security.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Vamosi: So what am I missing here. Here's an accomplished woman with five master's degrees and 15 years of experience in it.

Study 40