Owning your company’s digital footprint

Your organisation’s credentials are out there for all to see. Marketing messages, business statements, company information and everything written, posted or downloaded leaves a permanent trace in cyberspace. This is your organisation’s digital footprint. It is your online identity, made up of your unique set of traceable online activities, communications and information. Everything that goes […]

Read More
Add festive fun to your awareness campaigns

The festive period is a wonderful time of year for family, friends, goodwill and, of course, presents. And as festive shopping gets into full swing, it’s a thriving time for retailers and consumer businesses. But we’re not the only ones looking forward to Christmas. It’s also a very profitable time for cybercriminals as they target […]

Read More
Why do people make mistakes?

TSC’s sister organisation, the Security Awareness Special Interest Group (SASIG) connects cybersecurity professionals from all areas. We invite SASIG Supporters to share their cybersecurity insights in The Insider. In this piece, we review a report from machine learning email security company Tessian, delving into human error, the reasons why it happens and how to minimise […]

Read More
3 reasons to consider gamification as part of your information security programme

What is gamification? Gamification is the application of gaming techniques and elements into any non-gaming environment. It can be applied to learning and development situations, marketing, recruitment and even our own health regimes (known as ‘exergaming’ – think Fitbit and associated challenges within the software. Across gamification models, typical game-playing elements include point scoring, competition […]

Read More
A CISO’s guide to: Security awareness on a shoestring

Limited budget doesn’t mean limited information security awareness. The Project Management Triangle states you can only achieve two of the three basic project axes – quality, budget and schedule. For example, a low-quality project can be completed quickly and within budget. Similarly, sacrificing (increasing) budget means you can complete on time and to required quality. […]

Read More
Reaching parts other information security awareness programmes cannot reach

Show the value of good information security behaviour. The number of people in your Information Security team equals the number of employees in the business. In which case, you may have a lot of people to make aware of good information security behaviour. And while bringing in technology (often at eye-watering cost) reduces risks and […]

Read More
A CISO’s guide to: creative employee awareness campaigns

Comms campaigns may not be your forte so take a leaf from the Internal Communication handbook to get your message across “What we’ve got here is failure to communicate.” The Captain, “Cool Hand Luke” This line from Donn Pearce’s Cool Hand Luke – the story of a recalcitrant southern states prisoner and 1967 film starring […]

Read More
5 security awareness lessons to take away from 2018

What lessons can we learn from the past year and how can they inform our security awareness strategies going forward…?

Read More
3 types of insider threat and what to do about them

Many companies take careful measures to protect their critical assets from external risks, but they often remain vulnerable to insider threats. The latest Verizon Data Breach Investigations Report (DBIR), 2018, shows that 73% of cyber attacks were perpetrated by outsiders, such as organised criminal groups. However, this means that more than a quarter of all […]

Read More
Add a seasonal twist to help your awareness campaign stand out

Retail and consumer businesses thrive during seasonal holiday periods because these periods bring people together. When you are piecing together your organisation’s internal communications plans for the year ahead, it is worth taking seasonal holidays and recurring events (such as Scroll-free September, back to school, or even ‘talk like a pirate’ day) into account. You […]

Read More
This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy