To protect the integrity of research and safeguard sensitive information, institutions are increasingly prioritizing research security. All personnel involved in research activities—whether faculty, ...
First things first. All active employees at the university are required to comply with university information security policies. You can access and read them by visiting the university Policy Library.
What’s the one area in cybersecurity that is overdue for change? It's security awareness training. After three decades of underwhelming results, it’s clear that ...
Creating and maintaining a comprehensive training program increases the likelihood that employees have the necessary insight to identify potential attacks. A knowledgeable, well-staffed security team ...
In the summer of 2021, analyst Gartner published its Market guide for security awareness computer-based training. It reported that the human element (85%) continues to be a primary catalyst for data ...
Cybersecurity relies as much on human behavior as it does on technology. Even the most robust firewalls can be rendered ineffective with a single thoughtless click. As organizations face increasingly ...
The Computing Technology Industry Association reports that security training for your IT staff pays in the form of fewer security breaches that affect operations. According to CompTIA’s survey, 46% of ...
There is no question that security personnel benefit from quality training. Many states agree and mandate up to 40 hours of training to meet the requirements to get a security officer license. There ...
The phishing problem hits particularly close to home when you realize it's not just everyday employees falling for these tricks. Research from SiteGuarding recently uncovered a startling truth: 64% of ...
A new strategy for information security training that relies on agencies to share specialized products and best practices will roll out by the end of 2008, said representatives from the Homeland ...
Because of the types and volume of data that MTU works with, and because of the risk of financial, reputational, and other harm to MTU and its affiliates due to social engineering and other cyber ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results