PeopleSec Blog

What is Compliance?

Cybersecurity – No Magic Bullet

DUH Concept

Importance of Phishing

security awareness training

9 Signs Your Security Awareness Training is Failing

In this article, I’ll show you why the modern approach to Security Awareness Training & Education (SATE)  is failing and explain how we can do it better. Like most things that might initially seem impossible, it all begins with a proper mindset. There’s an old saying that goes something like this: “Whether you think you […]

Security Awareness – The Greatest Cyber Insanity

Awareness – The Greatest Cyber Insanity   One of the most common ways to help prevent cyber security breaches in enterprises is Cyber Security Awareness Training. Unfortunately training is often implemented poorly and inefficiently.   In this article, I’d like to talk about ten reasons why most cyber security training programs fail and what we […]

web app penetration testing

A Beginner’s Guide to Web App Security

Cybercrime continues to evolve and impact more people and businesses than ever before. Enterprise stakeholders must ensure they understand what could happen if their network is not secure and how they can protect their business online. Web apps today are a common source of security breaches for many enterprises because they lack necessary security measures. […]

how to prevent phishing

Learn What Phishing is and How to Prevent It

The security of your enterprise depends not only on the actual security procedures you have in place, but also in how well you and your employees follow those procedures. It’s vital to understand what you’re protecting the business against so you can explain to your employees exactly what they need to look out for. One […]

white hat hacker

Bad vs. Good Hackers: Your Guide to Ethical Hacking

Hacking has actually been around since before there were computers. In the early 20th century, hacking was used to crack codes during war times or even to hack telephones to be able to make free phone calls or cause other people to have huge phone bills. The 1980’s saw a more modern view of hackers, […]

The 10 Biggest Cybersecurity Issues That Can Take Down Your Data

The 10 Biggest Cybersecurity Issues That Can Take Down Your Data

Cybersecurity issues are one of the most significant problems facing business owners today. As many as 75% of data breaches are caused by external attackers. In light of this information, we wanted to bring your attention to ten of the biggest threats facing your cybersecurity tactics. Some of the topics we detail below overlap and often, two […]

5 Steps to Perform a Cyber Security Risk Assessment on Your Network

The first part of any cyber security audit is to assess risk. Risk is anything that could damage infrastructure, cost money from lost revenue, or threaten intellectual secrets. If you’re a small business owner and need to improvise, here are the steps to perform your own cursory review.   Review Your Network Resources   Before […]