TITLE

MODEL BEHAVIOR

AUTHOR(S)
Earls, Alan
PUB. DATE
June 2013
SOURCE
SC Magazine: For IT Security Professionals (15476693);Jun2013, Vol. 24 Issue 6, p22
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports that continued education of end-users to make them more resistant to threats is still crucial to enterprise security. Education is presented to greatly reduce risks related to social engineering or the manipulation of people into divulging proprietary information. At least once a quarter is suggested as the minimum on how often to conduct training activities that are recommended to be exciting. Assessments in the form of a game is cited to hone user sensitivities to threats. INSET: TRAINING: Bad actors.
ACCESSION #
88041780

 

Related Articles

  • Problems of information security of the firm (manufacture) and a way of their decision. Aleshnikov, Sergey; Demin, Sergey; Fedorov, Sergey; Fjodorov, Alexandr // Vestnik IKBFU;2013, Issue 10, p147 

    Problems of information security of the firm (manufacture) are considered. Their decision assumes studying of forms, ways and methods of revealing and the danger prevention in information sphere, and also the optimal control of system of maintenance of information security and a rational choice...

  • THE CONSUMERIZATION GAP.  // Campus Technology Magazine;Oct2011, Vol. 25 Issue 2, p38 

    The article offers information related to the usage of smart phones by information technology (IT) administrators.

  • PROTECTING THE ONLINE USER'S INFORMATION AGAINST PHISHING ATTACKS USING DYNAMIC ENCRYPTION TECHNIQUES. Emilin Shyni, C.; Swamynathan, S. // Journal of Computer Science;Apr2013, Vol. 9 Issue 4, p526 

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card...

  • 2010: The Time for Proactive Security. Dubin, Cindy H. // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p88 

    The article focuses on the proactive security management (PSM) plan that could be used by chief security officers (CSOs) to effectively design a plan to deal with worse-case settings relative to security threats. It mentions that CSOs were motivated to reconstitute the security policies of their...

  • Do you have a Killer Security Strategy? JAIN, RAHUL // Dataquest;3/31/2013, Vol. 31 Issue 6, p64 

    The article focuses on the importance of long-term security strategic planning in organizations to achieve their goals and prevent the threat of the environment. It suggests revitalizing security needs by working closely with the business and information technology (IT). It mentions the...

  • Experts: items as common as copiers can pose tech threats to companies. Wallace, Brice // Enterprise/Salt Lake City;9/24/2012, Vol. 42 Issue 8, p5 

    The article offers information on the myriad sources of technology security threats for businesses, from simple paper documents to corporate social media pages. It notes experts' views from the just-concluded Cyber Liability Conference and cites security company Symantec's report of a staggering...

  • Why Insider Threats Are Inevitable. Frenkel, Karen A // CIO Insight;8/19/2015, p1 

    The article presents the results of the survey conducted by Information Security Group on the insider threats faced by businesses. It states that insider threats have grown due to the lack of data protection strategies and solutions. It mentions that the response time for detecting an insider...

  • Supply Chain Security Innovations to Adapt to Emerging Threats. Anderson, Bill // Security: Solutions for Enterprise Security Leaders;Jun2011, Vol. 48 Issue 6, p28 

    The article focuses on supply chain security innovations and best practices for dealing with emerging threats. It states that sharing security accountability and ownership with local operations is important for a global business to respond to supply chain threats. It says that a calendar of...

  • HID Global Offers HID Channel Partner Program.  // SDM: Security Distributing & Marketing;Feb2010, Vol. 40 Issue 2, p100 

    The article reports on the launch of Advantage HID Channel Partner program by HID Global in Irvine, California which ensures that superior quality and service will be delivered to HID Global end-users through a selected network of sales channel partners.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics