About Family Driven Awareness

This author has not yet filled in any details.
So far Family Driven Awareness has created 69 blog entries.

Lateral movement

According to Carbon Black, 70% of all attacks attempt some kind of lateral movement. Indicating that an attack in one part of your business will most likely effect another. Meaning, if you feel you have an employee that is not important enough to be trained on cybersecurity awareness, think again!

2019-08-27T15:44:15-04:00Facts, Tips|

Spotting fake news

The digital world gives us access to a wealth of knowledge, allowing us to carry entire libraries in the palms of our hands, but it also gives us access to criminals, spammers, fake news makers, trolls, haters, frenemies, enemies and a wide range of people looking to deceive us. When [...]

2019-08-27T15:45:09-04:00Tips|

Hackers are hacking people

Looking closely at the digital forensics of many breaches, the acquired evidence often points to a similar root cause — people are getting tricked into doing things they shouldn’t be doing. Year after year, millions of people simply can’t resist the temptation of clicking on those interesting phishing emails, not [...]

2019-08-27T15:46:16-04:00Tips|

Cybersecurity and the C-suite

The increased spotlight on cybersecurity has required CEOs, boards of directors, and the entire C-suite to establish proper corporate governance to manage cyber security risks. This includes developing comprehensive policies, procedures, and reporting structures. Regulators expect organizations to develop and implement proper oversight and risk ownership protocols. To regulators, cybersecurity [...]

The New Currency

In the digital world we live in, information is the new currency, and that currency needs to be protected. Good cybersecurity awareness is not just for organizations and not just for governments — it’s for individuals everywhere. In a connected world, we each have a responsibility to protect ourselves and [...]

2019-08-27T15:48:18-04:00Facts, Tips|

Cyber security and your vendors

Focus on managing third party service providers and the potential risks those relationships pose. From a regulatory perspective, understand the cyber maturity of your vendor partners, what data they have access to, and where they might be vulnerable to cybersecurity threats. Weak vendor security controls translate to a weak cybersecurity [...]