THE CM BLOG.
READ ON FOR THE GOOD STUFF.
In Which We Go Medieval on Your Cyber Awareness
This weekend I stumbled upon a genius application of mashup playfulness. And of course I got totally sucked in. And made memes. We think a bit of novelty and creativity is just what is needed to get employees to pay attention. While attention is fleeting (alas), it is...
Cyber Security Awareness: Role, Unicorn, or Service?
Managing human risk is one of the top growing concerns with CISOs and business executives around the world. The role of a Security Awareness & Communications Manager as well as cyber security awareness computer based training are two key areas to increase maturity...
Differences Between Free Cyber Awareness Training vs Paid
One of the great quotable movie scenes of all time is the scene in the third Indiana Jones movie, Indiana Jones and the Last Crusade, where the ancient Knight guarding the Holy Grail gives a heads up to the Nazi treasure hunter and Indiana Jones to “choose wisely”. As...
The Princess Bride: Security Culture Runs Deep
“Inconceivable!” In Rob Reiner’s masterpiece, The Princess Bride, Vizzini distinguishes himself by repeatedly denying that the events ultimately leading to his death are actually happening. Vizzini, (played by Shawn Wallace), is a genius with a long, distinguished...
Want to Survive 2020? Get your BCP, Culture & Cyber Security Both Agile & Resilient
In times of crisis or chaos it’s hard to see beyond "the now". 15 days to flatten the curve that has turned into… months. But don't let it get you down as there are important things to build and progress to be made! I’ve always believed in actively creating the...
3 Quick & Innovative Ways to Keep Remote Teams Engaged With Cyber Safety
Remote working was on the move even before March 2020, offering a new set of pros (flexibility, larger area to source talent from) and cons (lack of in person social engagement, security considerations, management challenges) to companies across the globe. In the...
4 Things IT Needs Now in Order to Skate to Where The Puck Is Going
Compulsive hand sanitizing. Check. Home workout routine. Check. Volunteer to help community. Check. Regular chats with friends and family. Check. Remote Worker. CHECK CHECK!Like every other right-thinking human out there, I am working hard to stay focused on the...
Opportunities & Risks in Securing Your “New Normal” Workforce for 2021
Seems crazy to think that the hotbed of cybercriminal activity and digital transformation in 2018 and 2019 were ‘simpler times’, thanks to the Pancession, Panicdemic and Murder Hornets, 2020 is shaping up to be a real kick in the nether regions. Remote Teams, Virtual...
5 Cyber Security Tips for Job Seekers During COVID 19
Losing a job is often the worst, a real cut to the heart and pocketbook alike. Cybercriminals however, don’t really care about what you are going through, and are after you anyway (heartless bastards, aye). Here are some important things to keep in mind, so you keep...
5 Ways to Future Proof Your Business Cyber Risk Post Pandemic
Cyber Risk Post Pandemic....Just when you thought it couldn’t get worse. Just when you thought you could relax (a teeny bit) and hope that we will get back to normal. …but life isn’t like that sometimes. As business owners, as managers, as leaders in your companies-...
Is Your Cyber Security Relationship Like Talledega Nights?
Just as Cal’s push to outshine Ricky seemed inevitable, cyber security has tried to push its way onto the board agenda, sometimes rather awkwardly around the back of or away from the overall IT agenda. This competition for board attention has led to a few wins for CISCOs, but ultimately has created an extra obstacle for the digital transformation agenda overall.
FBI Warns of Major Spike in Cyberattacks With the Release of COVID-19 Relief Funds
What’s Going On Domestic cyber criminals and nation-state attackers alike are capitalising on this time of uncertainty. Right now there are two major targets. The first is remote workers, and the second is companies who have received aid packages from the government. ...
5 Scary Cyber Security Gaps if You Only Train Users on Phishing
Gaps in cyber security remains one of the most challenging issues for small business owners. Small businesses bear 43% of the brunt of cyber-attacks, opening them up to huge liabilities. This includes business closure. Of those attacked, 60% will go out of business...
Channeling Edna Mode as CISO for Creating Cyber Secure Humans
Is Your Work Culture geared towards protecting the most valuable assets in your company, your people?Everybody's saying it. Literally. Everybody. "The most important thing about [enter company name here] is our people."Ever since Peter Drucker started talking about...
Securing Your Millennials
For cybersecurity awareness, behavior and culture change we think hard about how we can engage everyone to be more secure. This includes sometimes the challenging feat of bringing millennials onboard with governance and compliance around information security…
COVID 19 Non Compliance
Getting People On Board When Change Matters. (aka. Why are people breaking quarantine? & How it relates to your Digital Outliers.)There is a shocking amount of non-adherence to clear and immediate directions regarding the coronavirus pandemic. Why is that? Ah, the...
The Matrix
The Matrix In the Wachowski’s film, The Matrix (starring Bill...or was it Ted?), the heroes of the film are betrayed by a member of their own team, Cypher (Joe Pantoliano). In perhaps one of the most prophetic scenes in any movie of recent memory, Cypher sits with the...
Once Upon A Time in Hollywood
A growing tide of unethical, and outright illegal, actors are trying to take advantage of us every day. This blog series will be dedicated to combining these two tools to help illuminate key issues facing us as these bad actors (see what I did there?!) try to manipulate our behaviour to serve their own, selfish, unethical purposes. Allow me to demonstrate…
How Hackers are Exploiting the Coronavirus Outbreak.
What are the Scares, Scams, Phishing, and Digital Threats to Employees from Hackers Exploiting the Coronavirus Outbreak? During natural disasters and other major events, criminally-minded people and other baddies are willing to do unethical things to make a profit....
How to Protect Your Identity and Data During Tax Season
According to Carbon Black, “Research into various marketplaces on the dark web found W-2 forms, 1040 forms and how-to guides for illicitly cashing out tax returns available. W-2s and 1040s are available on the dark web at relatively low cost, ranging from $1.04 to $52. Names, Social Security Numbers (SSNs) and birthdates can be obtained for a price ranging from $0.19 to $62.