We have spent the past few weeks focusing on security awareness training. We touched on what it is and why it is crucial. Now comes the step for action. For you and your employees to be the strongest first line of defense, you must make time for security awareness training. For as we have reiterated over and over, 95% of breaches are the cause of employee error. So the training is obviously necessary, so now time is the only barrier.
Last week’s blog, we discussed Security Awareness training. We delved into what it is and what precisely we offer at Pendello Solutions. Our goal this week is to give you some significant numbers to paint a vivid picture of why Security Awareness training is so necessary. In this day and age, Security Awareness training is something that can keep your hard-earned business as safe as possible from the devastating effects of a security breach.
Cybercriminals are continually updating their methods and tactics to sabotage people effectively and unfortunately, technology alone most likely will not keep you safe. Employee error is the cause of 95% of security breaches. Without proper training, your employees are the weakest link to your business’s security defense. How do you make sure that your business hasn’t already been compromised and that your employees are your most reliable link of defense? This is the point where security awareness training comes in to play. Pendello Solutions offers Security Awareness Training alongside Dark Web Assessments to put your business and your employees in an empowering, proactive state.
If you have been following our blogs this month, you hopefully have a better understanding of what the Dark Web is and how easily your credentials can end up there. With over 80,000+ compromised emails a day, other than education, there is no guaranteed way to prevent a security breach. Since a breach of data is somewhat inevitable, here is what we at Pendello Solutions are doing to minimize the damages which can be caused by a security breach.
You may trust that because you personally aren’t accessing the Dark Web that you don’t have anything to worry about. But, did you know that in Q1 of this year, in the financial sector alone, leaked credentials were up 129%? What does this mean, and how do these leaks happen?
Real-life examples of BECs
If you have been following the news, you should know that we are all at risk of Business Email Compromises (BEC). You may be growing tired of hearing this fact although it is a fact that we need to keep in the front of our minds at all time! Timing is a factor that these cybercriminals are continually accessing and know how to attack when your guard is down. Below are real-life examples of BECs that illustrate how easily these attackers researched, planned and struck at the right time and were able to victimize educated, experienced business people.
Business Email Compromise and Education
This month at Pendello we have been focusing on Business Email Compromise as the risk is definitely on the rise. If you remember, Business Email Compromise (BEC) is when an organized crime group gains access to your email through deception with the use of spear-phishing, identity theft, email spoofing, malware, and social engineering. In the past two weeks’ blogs, we introduced BECs and the different types of attack attempts. This week we are delving into how to recognize attack attempts. As 93% of all investigated data breaches can be traced back to a specific employee, we at Pendello Solutions know that end-user education is your best defense. So this month Pendello is bringing you some guidelines to look for when dealing with your day to day communications.