Writing Just to Write
As 2017 kicks off, my to-do list is growing and I really want to scratch off as many things as possible. In fact, I just want to move most of… Read more Writing Just to Write →
As 2017 kicks off, my to-do list is growing and I really want to scratch off as many things as possible. In fact, I just want to move most of… Read more Writing Just to Write →
It seems like everything security-related begins with “Yes, but…” or “It depends” these days. (No wonder users are frustrated.) Because of security problems surrounding credentials (data breaches, phishing attacks, and… Read more Not all 2FA is Created Equal →
Happy Holidays from Cyber Safe Workforce! Here’s a list of some of our free resources to use in your security awareness program. Passwords Strong Passwords Are Like Recipes Phishing The… Read more Happy Holidays: Free Resources →
When providing education on phishing, we tell employees to delete e-mails with attachments from unknown sources because of the potential for malware to infiltrate your network. However, there may be some cases where this would negatively impact business. Let’s look at a scenario where e-mails with attachments from unknown senders are a normal part of business operations. Perhaps you’re responsible for hiring and ask people to e-mail their resumes to you. Or, because you’re a hiring manager or in HR, people send you resumes out of the blue. How do… Read more But… I expect e-mails from new people all the time. →