Training employees to resist the lure of phishing, scams, and deepfakes is central to a good cybersecurity posture, but to be effective it needs to be handled with plenty of input and guidance from ...
Let me preface this with an attempt at a story: Sarah’s eyes darted across the email subject line, which read: “URGENT: Payment Needed – Action Required”. It was 4 p.m. on a Friday, and the CEO’s name ...
The Computing Technology Industry Association reports that security training for your IT staff pays in the form of fewer security breaches that affect operations. According to CompTIA’s survey, 46% of ...
What’s the one area in cybersecurity that is overdue for change? It's security awareness training. After three decades of underwhelming results, it’s clear that ...
Creating and maintaining a comprehensive training program increases the likelihood that employees have the necessary insight to identify potential attacks. A knowledgeable, well-staffed security team ...
To protect the integrity of research and safeguard sensitive information, institutions are increasingly prioritizing research security. All personnel involved in research activities—whether faculty, ...
Research Security & Integrity (RSI), in partnership with the Office of Contracts and Grants (OCG), has established processes and procedures to comply with the research security training requirement ...
In today's digital landscape, cybersecurity threats are constantly evolving. As organizations continue to adopt new technologies and expand their digital ...
First things first. All active employees at the university are required to comply with university information security policies. You can access and read them by visiting the university Policy Library.
In the summer of 2021, analyst Gartner published its Market guide for security awareness computer-based training. It reported that the human element (85%) continues to be a primary catalyst for data ...
Security awareness programs aren't keeping up. Let’s start with the hard truth: Despite billions spent on cybersecurity tools and infrastructure, the number one ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results