In the early days of unified communications, I spent a lot of time writing and talking about the need for organizations to focus on end user adoption, usage, and training. I presented and moderated ...
It's common among cybersecurity professionals to point to the end user as a top area of risk in securing the organization. This is understandable. Systems and software are under our control, but users ...
In today’s fast-paced organizations, end-users will sometimes try to take a shortcut. We've all been there — rushing to meet a deadline, juggling multiple tasks, or just trying to be helpful. But the ...
One of the biggest mistakes that low-performing security education programs make is treating security awareness training as if every user impacts security in exactly the same way. Everyone gets the ...
Password reuse is a difficult vulnerability for IT teams to get full visibility over. The danger is often hidden until it turns up in the form of hackers using compromised credentials as an initial ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results