The growing number of data breaches and the increased amount of cyber threats facing companies every day means jobs in information security are on the rise and are continuing to grow. But does the new talent have what it takes to keep us secure? Colleges and Universities don't often integrate security best practices into their programs, leaving a large number of new hires clueless on how to code securely. If you're an aspiring security engineer or analyst, or are a company looking to hire in this field, check out What it Takes to Work in Information Security to learn what attributes and skills you need to become successful in this field.
The NCSAM week 4 focus is to educate about emerging threats in cybersecurity. As experts in automotive security, we're taking this time to educate you about security threats associated with connected cars. If you're unfamiliar, connected cars are vehicles that connect to the internet...this could be for anything including GPS use, satallite radio, or for services such as On-Star. Most vehicles made after 2010 are considered connected cars. As cars are becoming more advanced, more technology is being used, and criminals are given more ways to exploit vehicle vulnerabilities. Read our FAQ sheet The Next Cybersecurity Target: Connected Cars to learn more about common risks and concerns with connected car security.
If you're interested in more detailed information on recent chances happening with connected cars and how automakers are dealing with these changes, read our two recent assets on automotive sercurity: Automakers Remain Passive as Government Takes Action and our 2015 Survey: Car Security - What to Automakers Really Think?. You can also register for our webinar on 11/12, going over the findings of the recent survey.
Week 3 is all about staying connected while always connected. With our phones, laptops, and tablets, we're always an arms length away from the online world. This week we're focusing on social media. With over 2 billion active social media accounts today, hackers and snoops are using this information to learn more about you. With a little research, nearly anyone can learn your name, address, email address, employer, and more. Learn more about the risks associated with social media safety in our new tip sheet "What Hackers Can Learn from Social Media in Less than 30 Minutes."
Did you know...? One in 10 social media users have said their accounts have been hacked and more than 600,000 Facebook profiles are hacked each day.
Online security should be a concern for many people, especially in the workspace. With many employees using their own personal devices for work, the risk increases. How well do you know about online security and does how does your business stack up? Take the quiz to find out.
|Start Learning About Online Security:
NCSAM week 2 focuses on cybersecurity at work. Statistics show 52 percent of security breaches start with a negligent employee. That could be anything from downloading malware, opening a malicious email, or not properly protecting their devices with passwords. Here at Security Innovation, we have a whole training program dedicated to information security and privacy awareness, and this week we're sharing some of those tips and best practices to help you stay secure at work.
Nearly every successful cyberattack begins with a simple mistake made by an employee. While most businesses think they're doing enough with endpoint security, it's important to remember that behind every piece of technology is a human ready to make an error. Learn why employees can be the biggest security risk for a company, and some basic tips on how employees can learn to be more aware of the threats around them with this fact sheet "A Successful Cyberattack Often Starts with the Employee."
To take one step further, you can become an expert and learn how to spot a phishing attack with this tip sheet. The most common way for hackers to trick employees is through phishing attacks. By becoming aware of common ways hackers successfully manipulate emails, you can protect yourself from becoming a victim of an attack.
Did you know...? A 2014 survey from EMA states 56 percent of employees have not undergone security awareness training, and those who do often receive it in one singular session.
Welcome to NCSAM Week 1! This week's theme focuses on best practices for all digital citizens and with mobile devices becoming a large part of our every day lives, we're offering some great tips on mobile security best practices.
Many of us use our phones for both business and personal use. Did you know there are now more mobile users than desktop? The increase in mobile device use means hackers are now targeting mobile devices more often. We've all seen the news: Android attacks, IoS attacks, malware within mobile apps. We're all at risk. This week, we're offering tips on mobile security best practices to help keep you and your device data safe from hackers, and we're starting with a quck tips 2 minute video on mobile security safety!
Did You Know...? Google reports the average mobile user has 36 apps installed on their phone. If one of those apps includes malware, your data could be at risk!
There are more mobile users online today then ever before. Most people always have their mobile phones within an arms reach away. People are using mobile devices for work, games, social media, shopping, and the list keeps going on. As people depend on their mobile devices more often, hackers rely on users not securing their devices to steal passwords, personal data, and other sensitive information.
Device loss or theft is one of the most common ways for hackers steal data. You may also find malware hidden in downloaded apps. With the increase in mobile threats on Android and iOS devices, users need to take security precautions to help protect personal data. Read our fact sheet on "Mobile Security: Are You at Risk?" to learn about the most common ways hackers attack mobile devices and what you can do to help secure your data.
National Cyber Security Awareness Month (NCSAM) – celebrated every October since 2003 – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Join us this month as we promote the importance of staying secure online!