Cryptomining infections are growing exponentially this year. Bad guys are hijacking your network processing power to steal your workstation and server resources. They are using various families of malware trying to stay under your radar.
The bad guys are getting very creative, impersonating an executive in your organization and asking for financial reports or they ask employees in payroll to make changes to bank accounts. According to the FBI, their efforts have earned them an estimated $12 billion through Business Email Compromise also known as CEO fraud scams. Defending against these types of phishing attacks is possible by layering technical and non-technical controls.
Attackers follow a number of paths as they search for entry-points into your organization. Join Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and former Gartner Research Analyst, in this practical session providing a high-level overview of the theory/practices used, showing you how to simulate those same tactics using both free and subscription-based aspects of KnowBe4's platform.
Recently, the news has been packed with W-2 phishing and CEO fraud, also known as "Business Email Compromise" attacks, costing companies over 3.4 billion dollars in 2017. Per a new “urgent alert” issued by the U.S. Internal Revenue Service, internet criminals have now combined both schemes and at the same time are targeting a much wider range of organizations than ever before. Join Erich Kron to look at scary features of the new threats of W-2 phishing and CEO fraud, give actionable info that you need to prevent infections, and what to do when you are hit.
Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! We will explore 11 ways hackers can and do get around your favorite 2FA solution. The webinar includes real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
Join Stu Sjouwerman and Perry Carpenter as they provide fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, They'll look at how to ethically use the very same levers when educating our users.
With 91% of data breaches being the result of human error, security leader, auditors, and regulators are increasingly focused on creating an effective security awareness and training program that focuses on the human side of security. Join our guest speaker, Nick Hayes from Forrester Research, and KnowBe4's own Perry Carpenter for results-focused strategies and insight for building a world class security awareness training program.
Watch this insider’s perspective of cybersecurity trends to expect in 2018 from our founder Stu Sjouwerman. The list of six predictions are founded on KnowBe4’s deep insight into threats that organizations experience today and should expect tomorrow.
In this 30-minute webinar Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will look at scary features of new ransomware strains and give you 5 strategies you can implement now to help you prevent ransomware and how to fortify your last line of defense—your end users.
While reported numbers fluctuate from industry study to industry study, they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start.
KnowBe4 recently commissioned Forrester to conduct a Total Economic Impact™ (TEI) study, examining the potential Return on Investment (ROI) enterprises might realize by implementing KnowBe4. How does 127% ROI with a one-month payback sound?
In part 2 of this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth. Including actionable items you can use like, if you should negotiate or pay the ransom, a ransomware prevention and attack response checklists and proven methods of protecting your organization.