https://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.png00patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2019-04-29 09:33:292019-04-30 08:45:15What is Compliance?
https://peoplesec.org/files/2019/04/Information-Technology-vs-Information-Security.jpg600900patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2019-03-17 10:42:222019-04-25 10:38:52Difference Between IT and Information Security
https://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.png00patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2019-03-05 17:46:572019-04-25 10:38:11Importance of Phishing
In this article, I’ll show you why the modern approach to Security Awareness Training & Education (SATE) is failing and explain how we can do it better. Like most things that might initially seem impossible, it all begins with a proper mindset. There’s an old saying that goes something like this: “Whether you think you […]
https://peoplesec.org/files/2018/12/security-awareness-training.jpg533800patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2018-12-05 11:24:382018-12-05 11:24:389 Signs Your Security Awareness Training is Failing
Awareness – The Greatest Cyber Insanity One of the most common ways to help prevent cyber security breaches in enterprises is Cyber Security Awareness Training. Unfortunately training is often implemented poorly and inefficiently. In this article, I’d like to talk about ten reasons why most cyber security training programs fail and what we […]
https://peoplesec.org/files/2017/01/learn-security-awareness.jpg9221000patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2018-11-30 09:09:342018-12-10 17:50:25Security Awareness – The Greatest Cyber Insanity
Cybercrime continues to evolve and impact more people and businesses than ever before. Enterprise stakeholders must ensure they understand what could happen if their network is not secure and how they can protect their business online. Web apps today are a common source of security breaches for many enterprises because they lack necessary security measures. […]
https://peoplesec.org/files/2018/08/analyst-analytics-blur-106344.jpg8011200patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2018-08-01 11:18:522018-07-25 11:27:10A Beginner’s Guide to Web App Security
The security of your enterprise depends not only on the actual security procedures you have in place, but also in how well you and your employees follow those procedures. It’s vital to understand what you’re protecting the business against so you can explain to your employees exactly what they need to look out for. One […]
https://peoplesec.org/files/2018/07/black-and-white-computer-display-220357.jpg9001200patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2018-07-24 10:45:042018-07-24 10:47:49Learn What Phishing is and How to Prevent It
Hacking has actually been around since before there were computers. In the early 20th century, hacking was used to crack codes during war times or even to hack telephones to be able to make free phone calls or cause other people to have huge phone bills. The 1980’s saw a more modern view of hackers, […]
https://peoplesec.org/files/2018/07/black-and-white-darkness-fashion-67603.jpg8031200patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2018-07-17 15:44:542018-07-17 15:49:12Bad vs. Good Hackers: Your Guide to Ethical Hacking
Cybersecurity issues are one of the most significant problems facing business owners today. As many as 75% of data breaches are caused by external attackers. In light of this information, we wanted to bring your attention to ten of the biggest threats facing your cybersecurity tactics. Some of the topics we detail below overlap and often, two […]
https://peoplesec.org/files/2018/07/cyber-security-cybersecurity-device-60504.jpg533800patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2018-07-11 16:25:392018-07-11 16:30:43The 10 Biggest Cybersecurity Issues That Can Take Down Your Data
The first part of any cyber security audit is to assess risk. Risk is anything that could damage infrastructure, cost money from lost revenue, or threaten intellectual secrets. If you’re a small business owner and need to improvise, here are the steps to perform your own cursory review. Review Your Network Resources Before […]
https://peoplesec.org/files/2018/02/image_628894376.jpg6671000patrickhttps://storage.pardot.com/189082/1668175372UeLz7nOr/peoplesec_pentesting_Logo_300x138.pngpatrick2018-02-25 12:56:272018-02-25 14:00:465 Steps to Perform a Cyber Security Risk Assessment on Your Network
What is Compliance?
/0 Comments/in C-Suite Series /by patrickCybersecurity – No Magic Bullet
/0 Comments/in C-Suite Series /by patrickDUH Concept
/0 Comments/in C-Suite Series /by patrickDifference Between IT and Information Security
/0 Comments/in C-Suite Series /by patrickImportance of Phishing
/0 Comments/in C-Suite Series /by patrick9 Signs Your Security Awareness Training is Failing
/0 Comments/in Phishing, Security Awareness Training and Education (SATE) /by patrickIn this article, I’ll show you why the modern approach to Security Awareness Training & Education (SATE) is failing and explain how we can do it better. Like most things that might initially seem impossible, it all begins with a proper mindset. There’s an old saying that goes something like this: “Whether you think you […]
Security Awareness – The Greatest Cyber Insanity
/0 Comments/in Phishing, Security Awareness Training and Education (SATE) /by patrickAwareness – The Greatest Cyber Insanity One of the most common ways to help prevent cyber security breaches in enterprises is Cyber Security Awareness Training. Unfortunately training is often implemented poorly and inefficiently. In this article, I’d like to talk about ten reasons why most cyber security training programs fail and what we […]
A Beginner’s Guide to Web App Security
/0 Comments/in Security Tips /by patrickCybercrime continues to evolve and impact more people and businesses than ever before. Enterprise stakeholders must ensure they understand what could happen if their network is not secure and how they can protect their business online. Web apps today are a common source of security breaches for many enterprises because they lack necessary security measures. […]
Learn What Phishing is and How to Prevent It
/0 Comments/in Phishing /by patrickThe security of your enterprise depends not only on the actual security procedures you have in place, but also in how well you and your employees follow those procedures. It’s vital to understand what you’re protecting the business against so you can explain to your employees exactly what they need to look out for. One […]
Bad vs. Good Hackers: Your Guide to Ethical Hacking
/0 Comments/in Security Tips, Teachable Moments /by patrickHacking has actually been around since before there were computers. In the early 20th century, hacking was used to crack codes during war times or even to hack telephones to be able to make free phone calls or cause other people to have huge phone bills. The 1980’s saw a more modern view of hackers, […]
The 10 Biggest Cybersecurity Issues That Can Take Down Your Data
/0 Comments/in Phishing, Security Tips /by patrickCybersecurity issues are one of the most significant problems facing business owners today. As many as 75% of data breaches are caused by external attackers. In light of this information, we wanted to bring your attention to ten of the biggest threats facing your cybersecurity tactics. Some of the topics we detail below overlap and often, two […]
5 Steps to Perform a Cyber Security Risk Assessment on Your Network
/0 Comments/in Security Tips /by patrickThe first part of any cyber security audit is to assess risk. Risk is anything that could damage infrastructure, cost money from lost revenue, or threaten intellectual secrets. If you’re a small business owner and need to improvise, here are the steps to perform your own cursory review. Review Your Network Resources Before […]