Remove cyber-awareness-month-resources
article thumbnail

Cyber Awareness Month Resources

GovLoop

October is typically considered a spooky month, but not only because of zombies, ghosts and witches. It’s also Cybersecurity Awareness Month which means there’s a spotlight on the very real dangers and risks associated with cyber threats. Favorite

2004 69
article thumbnail

October is Cybersecurity Awareness Month: Are you prepared?

Open Access Government - Technology News

Martin Roots, Managing Director at the Expede Group, discusses cybersecurity awareness, walking us through different cyber attacks and how to prevent them efficiently. Cybersecurity awareness has never been more important. In fact, over 90% of cyber-crime incidents are now caused by criminals targeting staff.

Campaign 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improving software security in the public sector

Open Access Government - Technology News

In 2022, the National Cyber Strategy Committee announced the British government’s Cyber Security Strategy, which recognised a significant gap between where the UK’s cyber resilience was compared to where it should be. Over the last few years, it has launched several initiatives to bolster its cybersecurity.

article thumbnail

Turn Your “Weakest Link” Into a “Human Firewall”

GovLoop

Although system intrusion, usually by well-organized cybercrime networks or state actors, has become much more frequent in the past two years, mistakes such as falling for a phishing attack, misconfiguring resources, sending data to the wrong recipient and losing devices account for most employee-caused breaches. And finally, make it fun.

article thumbnail

The Importance of Multifactor Authentication

The CIO Council

Cybersecurity Awareness Month is a great opportunity for all of us to think through how we approach cybersecurity in both our work and personal lives. Every day, we hear stories about the latest compromise at an organization, or a person who has fallen victim to cyber criminals.

article thumbnail

Turn Your “Weakest Link” into a “Human Firewall”

GovLoop

Although system intrusion, usually by well-organized cybercrime networks or state actors, has become much more frequent in the past two years, mistakes such as falling for a phishing attack, misconfiguring resources, sending data to the wrong recipient and losing devices account for most employee-caused breaches. And finally, make it fun.

article thumbnail

How Hartnell College recovered critical systems using AWS after a cyber attack

AWS Public Sector Blog

Chelsy Pham, chief information systems officer, arrived at the college in the spring of 2022, the college was aware of the need to modernize its IT infrastructure. A network outage sparked suspicion that a cyber attack had occurred, and Hartnell IT shut down all internal network activities.