<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/cyber-security/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog , Cyber Security</title><description>ActiSoft Technology - Blog , Cyber Security</description><link>https://www.actisofttechnology.com/blogs/cyber-security</link><lastBuildDate>Wed, 22 Apr 2026 17:12:36 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[The Hidden Cost of Cyber Crime And How to Avoid it]]></title><link>https://www.actisofttechnology.com/blogs/post/the-hidden-cost-of-cyber-crime-and-how-to-avoid-it</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-864427926.jpg"/>When a new story hits the news about another organisation being hit by a cyber attack, it’s mostly numbers we hear about. We’re told how many records ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nCVXTsZdciDKEltIAflK5w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width: 500px ; height: 500.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:500.00px ; } } @media (max-width: 767px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:500.00px ; } } [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-851982190.jpg" width="500" height="500.00" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>When a new story hits the news about another organisation being hit by a cyber attack, it’s mostly numbers we hear about. We’re told how many records were compromised, how many hours were lost, how much ransom money was demanded and how big a fine the company will have to pay to the ICO.&nbsp;</div><br><div>What we don’t hear so much about is the human cost of cyber attacks, or how those responsible for handing over valuable data (mostly completely innocently) feel about their mistakes.&nbsp;</div><br><div>Fraudsters know how to play on people’s weaknesses, and they’re very good at it. It’s easy to think you’d never fall for a scam if it’s never happened to you, but the truth is that hundreds of thousands of people do get caught out every year. Often, those people are highly intelligent, organised and diligent, and&nbsp; just happened to be having a bad day.&nbsp;</div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_oJ23SJOuhGdhSyQPnbKG3A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_oJ23SJOuhGdhSyQPnbKG3A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_rs97wi0e3TGzvMw88uEtXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_rs97wi0e3TGzvMw88uEtXQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_iTiXhIfBNKriYWqJuECdGw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iTiXhIfBNKriYWqJuECdGw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Being tired, overworked, stressed or simply relaxing in the lead up to a holiday can cause even the brightest spark to make simple mistakes. Nobody is immune to cyber attacks, and hackers capitalise on that fact every single day. The situation is now so serious that mental health professionals are referring to cyber crime as a new, hidden epidemic, and those who fall victim to hackers often pay a heavy <a href="https://www.zdnet.com/article/it-is-stressful-it-is-frightening-what-its-like-to-be-a-victim-of-hacking-and-ransomware/" title="psychological price." target="_blank" rel="">psychological</a><a href="https://www.zdnet.com/article/it-is-stressful-it-is-frightening-what-its-like-to-be-a-victim-of-hacking-and-ransomware/" title="psychological price." target="_blank" rel=""> price.</a> It goes way beyond having information stolen or even handing over money. It’s about deep-seated feelings of guilt, embarrassment and powerlessness, and in an increasing number of cases victims are being diagnosed with depression, post traumatic stress disorder or other related health problems.</span><br></p></div>
</div><div data-element-id="elm_XspaGs-BjiVgK8cQnqOUzQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XspaGs-BjiVgK8cQnqOUzQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div>A recent <a href="https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime" title="survey" target="_blank" rel="">survey</a> found that almost 70% of victims said they felt they could no longer trust strangers, and over half said they were no longer able to enjoy the activities they used to. Depression and anxiety were reported in over half the respondents, with almost 85% experiencing insomnia following a data breach. More than 60% said they experienced difficulties with concentration and cognitive function, while just under 57% said they regularly experienced aches, pains and headaches.&nbsp;</div></div><br><div>In severe cases, the shame of compromising company data and being seen as “the weakest link” in an organisation has even led to suicide. So, how do you protect your employees and your company from the chaos of a data breach? These 7 simple security measures will help keep you and your people safe and help you avoid the long term repercussions of cyber crime.</div></div></div></div>
</div></div><div data-element-id="elm_qEj7vjhjCDbN2GOn3lWCew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qEj7vjhjCDbN2GOn3lWCew"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank" title="FREE Trial" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Banner_Endpoint_160x600.jpg" width="160" height="600" loading="lazy" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_buY6wz1cjvlWGdko1QAEKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_buY6wz1cjvlWGdko1QAEKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-weight:700;">1. Make Sure You Have Endpoint Protection Software on Every Device</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>A lot of people still think that anti-virus software is just for laptops and PCs, but you should have it installed on every device on which people access your systems.&nbsp;</div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-weight:700;">2. Use Different Passwords</span></div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br><div><div>Many of us are guilty of re-using the same password for different accounts, but it’s a really bad habit to get into. Having to remember different passwords for all your online activities can be exhausting and frustrating, but if you use a system like <a href="/password-manager" title="Keeper" target="_blank" rel="">Keeper</a> you won’t have to. <a href="/password-manager" title="Password management systems" target="_blank" rel="">Password management systems</a> remember everything for you, so you and your team can stay safe without having to deal with an administrative nightmare.</div></div><br></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-weight:700;">3. Switch to Multi-factor Authentication&nbsp;</span></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br><div>Entering a username and password is just one step in the online security process, so more and more organisations are choosing to protect their data with several layers of protection. Multi-factor authentication requires you to provide more information to confirm your identity, such as:</div><div><ul><ul><li><span style="color:inherit;">Something you know – a password or PIN</span></li><li>Something you have – like a&nbsp;<span style="color:inherit;"><a href="/security-keys" title="Security Key" target="_blank" rel="">Security Key</a>,&nbsp;</span>secure USB or phone number<br></li><li>Something you are – such as a fingerprint or retina scan&nbsp;<br></li></ul></ul></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><br><div><span style="font-weight:700;color:inherit;">4. Protect Every Device</span><br></div><br><div>One of the downsides of&nbsp; remote working is that your team members will most likely be using their own devices to log into your network. It’s imperative to clearly outline everyone’s responsibilities when it comes to looking after those devices, from keeping them safe on public transport to ensuring nobody else has access to them.&nbsp;</div><br><div><div>You’ll need a robust Bring Your Own Device (BYOD) policy in place to ensure everyone knows what’s expected of them – get advice on how to create one <a href="https://www.ncsc.gov.uk/collection/device-security-guidance/bring-your-own-device" title="here." target="_blank" rel="">here.</a>&nbsp;</div></div><br><div>It's important to note that under the GDPR, if any device containing personal information is stolen it must be reported to the ICO within 72 hours. It’s also a good idea to install tracking software on your devices so they’re easier to get back in the event of theft or loss.&nbsp;</div><br><div><span style="font-weight:700;">5. Make Sure Your Software is Always Up to Date</span></div><br><div>One of the easiest ways for hackers to infiltrate organisations is through outdated software. Every time someone hits the “update later” button it makes your organisation more vulnerable, so make it policy to ensure all software is updated at the same time every week.</div><br><div><span style="font-weight:700;">6. Back up Regularly&nbsp;</span></div><br><div>Even if the worst does happen and you lose your data, it will be a whole lot easier to deal with if you’ve got everything backed up in another place. You can store copies of your data in an external hard drive, but most businesses nowadays choose to back up in the Cloud. A good security provider will perform backups on your behalf and regularly monitor activity on the network, which means you won’t have to give it a second thought.&nbsp;</div><div><br></div><div>Don't forget to test your backup regularly!</div><br><div><span style="font-weight:700;">7. Educate and Support Your Staff</span></div><br><div>This is the number one most important thing you can do when it comes to cyber security. Human error is the biggest cause of data breaches, so by keeping everyone trained and up to date with the latest phishing threats and how to recognise them, you’ll be going a long way towards keeping your customer information safe.&nbsp;</div><br><div>With the right training, employees should all be able to spot a phishing email or dodgy link and know what to do if something doesn’t look right. It’s also important to create a culture in which people feel comfortable to ask if they’re not sure about something, and don’t feel under too much pressure. Of course, an element of pressure is expected in every job, but when people are overloaded, they’re more likely to make mistakes. And as we’ve already seen, sometimes those mistakes have far reaching consequences. Creating a culture of fear won’t work, but providing a supportive, educational environment just might.</div><br><div>We are here to help you and your team stay safe online. To find out more, or to book a cyber security training session, contact us today.</div></div></div></div></div></div></div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Endpoint &amp; DNS Protection Together</h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">To secure businesses, you need endpoint protection that’s stronger and smarter than traditional business antivirus and s</span><span style="color:inherit;">ecure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce security risk.</span><br></p></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 350px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:350px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:350px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Banner_Endpoint_300x350.jpg" width="300" height="350" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Why it's different:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="font-size:18px;">Stop sophisticated cyber attacks</span></li><span style="font-size:18px;"><li>Streamline Management<br></li><li>Save time and money</li><li>Skip the hardware and software with our DNS Protection</li><li>Block threats at the domain level</li><li>Reduce costs relating to infections</li><li>Protection wherever you are</li></span></ul></div>
</div></div></div></div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank"><span class="zpbutton-content">Try it now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 04 Apr 2022 14:34:15 +0000</pubDate></item><item><title><![CDATA[How To Harness the Power of Data in Your Organisation ]]></title><link>https://www.actisofttechnology.com/blogs/post/how-to-harness-the-power-of-data-in-your-organisation</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-637242422s-1.jpg"/>Companies all over the world are learning that one of the best ways to future-proof their organisations is by harnessing the power of data. According ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nCVXTsZdciDKEltIAflK5w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width: 500px ; height: 333.20px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:333.20px ; } } @media (max-width: 767px) { [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"] .zpimagetext-container figure img { width:500px ; height:333.20px ; } } [data-element-id="elm_nCVXTsZdciDKEltIAflK5w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g777ffc8a5a81985b6a9b3fcb76212a9c1e5f2f194665e0186a208189830e61a623f820033c87ec9301c73ce30d9a19993b1050eff3b6034062ce31c17ee1ef18_1280.jpg" width="500" height="333.20" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div>Companies all over the world are learning that one of the best ways to future-proof their organisations is by harnessing the power of data. According to a recent survey from <a href="https://www.mckinsey.com/business-functions/people-and-organizational-performance/our-insights/organizing-for-the-future-nine-keys-to-becoming-a-future-ready-company" title="McKinsey" target="_blank" rel="">McKinsey</a>, today’s leaders understand that data isn’t just part of business, it is business. But there’s a big difference between simply collecting data and using it properly, so how do you ensure you’ve got all the information you need to succeed without getting bogged down in statistics?&nbsp;</div></div><br><div>For most companies, data collection is about three things:</div></div></div></div></div></div></div></div></div></div></div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><ul><ul><li>Informing and improving decision making</li><li>Refining operations</li><li>Creating new revenue streams</li></ul></ul></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_oJ23SJOuhGdhSyQPnbKG3A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_oJ23SJOuhGdhSyQPnbKG3A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_rs97wi0e3TGzvMw88uEtXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_rs97wi0e3TGzvMw88uEtXQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_d3oC93lZYgiGkIQSGu4x6w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_d3oC93lZYgiGkIQSGu4x6w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Informing and Improving Decision Making&nbsp;</span></h3></div>
<div data-element-id="elm_iTiXhIfBNKriYWqJuECdGw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iTiXhIfBNKriYWqJuECdGw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">A recent study by <a href="https://www.bain.com/insights/big_data_the_organizational_challenge" title="Bain &amp; Company," target="_blank" rel="">Bain &amp; Company,</a> which looked at over 400 organisations, found that those who used advanced data analytics made decisions five times quicker than their peers. Data helps us understand the way our customers think and provides deep insights into which processes are working, as well as those that would benefit from a different approach.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_CMV6BZlhD9Vn89jdUrv4UQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_CMV6BZlhD9Vn89jdUrv4UQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Refining Operations</span></h3></div>
<div data-element-id="elm_XspaGs-BjiVgK8cQnqOUzQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XspaGs-BjiVgK8cQnqOUzQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Today’s data sources allow organisations to refine everyday operations and processes and work more efficiently. From customer feedback to production line reports, we now have a host of information at our fingertips to help us be bigger and better than ever.</div><br><div>A good example of this is the use of GPS software in delivery vehicles – companies like Amazon have used this new technology to their full advantage, giving customers and managers alike regular updates on deliveries. They’ve also used data in all sorts of ways to influence customer decisions, like the recently introduced Personal Recommendation system that prompts consumers on the products they might need, before they even know it&nbsp; themselves.&nbsp;</div></div></div>
</div></div><div data-element-id="elm_qEj7vjhjCDbN2GOn3lWCew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qEj7vjhjCDbN2GOn3lWCew"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width: 160px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width:160px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"] .zpimage-container figure img { width:160px ; height:600px ; } } [data-element-id="elm_IvmaGTMPpVMFDzqHFZ30yw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank" title="FREE Trial" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Banner_Endpoint_160x600.jpg" width="160" height="600" loading="lazy" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_n6HF4QdNZpL5YbBfRgZ2pg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_n6HF4QdNZpL5YbBfRgZ2pg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Creating New Revenue Streams</span></h3></div>
<div data-element-id="elm_buY6wz1cjvlWGdko1QAEKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_buY6wz1cjvlWGdko1QAEKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>The more in-depth and interesting your data, the more attractive a business asset it becomes. So much so that companies are now being bought based on how much data they collect, like in the case of IBM’s takeover of The Weather Company. Originally founded as the Weather Channel in 1982, the company invested in technology that allowed it to offer an impressive line of digital products. They changed their name to the Weather Company in 2012 and a number of eagle-eyed investors noticed the wealth of information they had collected about weather patterns. IBM soon snapped them up and has since been able to position itself as one of the leading suppliers of weather information in the world. Even if you don’t want your company to be acquired by one of the big fish, your data will still be valuable to someone.&nbsp;</div><br><div>However far along you are in your journey, you’ll need a robust data strategy in place. Before you go on a mission to collect all those facts and figures , it’s important to know what you want to do with it. That means starting with a robust data strategy that clearly identifies what you’re trying to achieve and how you plan to do it.</div><br><div>The amount of data that exists around the globe is growing rapidly – 90% of it has only become available over the past couple of years. As that data continues to increase, managing it properly has become essential, which is why all businesses need a data strategy.&nbsp;</div><div><div style="color:inherit;"><div><ul><ul><li>Like all business planning activities, your company data strategy should be SMART and flexible, allowing you to scale up and down according to need.</li><li>Without a data strategy in place, different departments and team members find themselves having to make decisions about information and solve data decisions on their own. This adds up to confusion and a lot of wasted time and money, so it’s important to develop clear guidelines in order to keep costs low and operations running smoothly.&nbsp;</li><li>Define how your data will help you meet business goals.</li><li>Identify how you will complete data collection activities in line with those goals.</li><li>Outline any changes you need to make within your organisation to make the most of your data.</li><li>Establish a timeline for all your data collection activities and milestones.</li><li>Describe your short-, mid- and long-term data collection strategies.</li><li>Discuss how these activities can be financially justified.</li><li>Identify what software you intend to use and how your insights can be monetised.</li><li>Include information about how your data will be stored and kept safe.</li></ul></ul></div><br><div><span style="color:inherit;">Data Security should be your number one priority when it comes to collecting any kind of information. Since the introduction of the GDPR and the ever-increasing risk of hacking, it’s never been more important to make sure your data is safe. Here are some important things to consider for your new data strategy:</span><br></div><div><div style="color:inherit;"><div><ol><ol><li>Always make sure your data is regularly backed up</li><li>Ensure all your staff are well trained in cyber security and clear about access and data sharing</li><li>Use Cloud computing systems to keep your information remotely</li><li>Invest in some reliable Antivirus software and install it on all devices that access your systems</li><li>Always keep your data protected with a robust cyber security strategy</li></ol></ol></div><br><div><span style="color:inherit;">We are here to help you keep your data safe. Contact us today to find out more about our cyber security products and services, including data strategy implementation and staff training.&nbsp;</span><br></div></div></div></div></div></div></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Endpoint &amp; DNS Protection Together</h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">To secure businesses, you need endpoint protection that’s stronger and smarter than traditional business antivirus and s</span><span style="color:inherit;">ecure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce security risk.</span><br></p></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 300px !important ; height: 350px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:350px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:300px ; height:350px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Banner_Endpoint_300x350.jpg" width="300" height="350" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Why it's different:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="font-size:18px;">Stop sophisticated cyber attacks</span></li><span style="font-size:18px;"><li>Streamline Management<br></li><li>Save time and money</li><li>Skip the hardware and software with our DNS Protection</li><li>Block threats at the domain level</li><li>Reduce costs relating to infections</li><li>Protection wherever you are</li></span></ul></div>
</div></div></div></div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/WebrootFREETrial/formperma/4Uqfivh26C8j8E9NiuOOniLeiEdlAMaCbjlXGagYqC0" target="_blank"><span class="zpbutton-content">Try it now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 30 Mar 2022 13:40:01 +0000</pubDate></item><item><title><![CDATA[How to Run a Successful Security Awareness Training Program]]></title><link>https://www.actisofttechnology.com/blogs/post/how-to-run-a-successful-security-awareness-training-program</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1551892589-865f69869476?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDV8fHN1Y2Nlc3N8ZW58MHx8fHwxNjMzMTAxNzk4&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman As we're now in Cybersecurity Awareness Month, thinking about how to strengthen your security awarene ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_lpqQgyRkuRV_0HPMTdSINw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lpqQgyRkuRV_0HPMTdSINw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>As we're now in Cybersecurity Awareness Month, thinking about how to strengthen your security awareness training program is probably top of mind.</div><div><br></div><div><div>Luckily, we've got you covered with helpful tips you can use to run a strong <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> program in your organisation! We asked our Security Awareness Advocates for their expert advice on questions like how to get started, how to motivate your users, and how to develop a strong security culture over time. While not an exhaustive list, here is a handy one-sheet with what they had to say:</div></div></div></div>
</div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zrlU52YkTRkQhP4BSNauxw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_zrlU52YkTRkQhP4BSNauxw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/files/Successful%20Security%20Awareness%20Training%20Program.jpg" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Successful%20Security%20Awareness%20Training%20Program.jpg" size="original"/></picture></a></figure></div>
</div><div data-element-id="elm_3zZJSo2Y2wBtTkrKEDmqlg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3zZJSo2Y2wBtTkrKEDmqlg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-style:italic;">Click <a href="/files/Successful%20Security%20Awareness%20Training%20Program.jpg" target="_blank" rel="">here</a> to download the full infographic</span></p></div>
</div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_JA7v4ZVdMgAguRdsoSwneQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JA7v4ZVdMgAguRdsoSwneQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-weight:700;">Critical components of a successful security awareness program:</span></div>
<div><ul><ul><li>Use good, high quality content that’s highly relevant to your users</li><li>Reinforce the training with regular simulated phishing attacks</li><li>Stay current with what is happening in real phishing attacks - mirror the topics and methods used by cybercriminals</li></ul></ul></div>
<div><span style="font-weight:700;">How to motivate your users to do their training on time:</span></div>
<div><ul><ul><li>Lead with a carrot, not a stick! Reward users upon completion (could be a sticker, certificate, raffling off a gift card, etc.)</li><li>Make it a game and create healthy competition between departments or other groups</li><li>Get your leadership involved publicly - make sure it’s well known and seen. It will make the rest of the organisation want to follow in their footsteps</li></ul></ul></div>
<div><span style="font-weight:700;">How to gain and maintain executive support for your security awareness program:</span></div>
<div><ul><ul><li>Speak their language: Don’t get too technical, and tie it to business objectives (risk, reputation, business benefits, profit and loss impact, etc.)</li><li>Address the “why” and how does it help your organisation be more successful</li><li>Talk about cybersecurity in the news, how it was a result of human error, and how this program will help to mitigate human error</li></ul></ul></div>
<div><span style="font-weight:700;">How to measure the benefits of a successful security awareness program:</span></div>
<div><ul><ul><li>Track metrics like the phish-prone percentage of your organisation or number of phishing emails reported over time</li><li>Conduct surveys with different stakeholders to gauge their perception of the program’s success</li><li>Whatever you use to measure success, make sure it is defined, agreed upon and tracked</li></ul></ul></div>
<div><span style="font-weight:700;">How to develop a stronger security awareness culture over time:</span></div>
<div><ul><ul><li>Evaluate your organisation against the <a href="https://forms.zohopublic.eu/actisofttechnologycom/form/SecurityCultureReport2021/formperma/0VnPhieKikRwF3X5v74SOS9mozTV8ROGkMdWrEGTb2E" title="7 dimensions of security culture" target="_blank" rel="">7 dimensions of security culture</a>, and measure it against your industry’s benchmarks (we have done studies on this!)<br></li><li>Tie your security culture into your overall organisational culture so the two are not at odds</li><li>Understand that there is no fast track to a good security culture - by consistently following the advice above, you will develop a strong security awareness culture over time</li></ul></ul></div>
<div><div>We hope these tips can help you implement new-school security awareness training for your users. Here are <a href="https://support.knowbe4.com/hc/en-us/articles/4406863822483-How-to-Develop-a-Successful-Security-Awareness-Program" title="more in-depth videos" target="_blank" rel="">more in-depth videos</a> on our partner support site. Make sure you're prepared for Cybersecurity Awareness Month and beyond!&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</div></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Get Your Free <span style="font-weight:700;">2021 Cybersecurity Awareness Month Resource Kit</span></span><br></h2></div>
<div data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In today's hybrid work environment, your users are more susceptible than ever to attacks like phishing and social engineering. Cybercriminals know this and are constantly changing tactics to exploit new vulnerabilities. We've put together these resources so you can keep your users on their toes with security top of mind. Request your kit now to help your users defend against cybercrime whether they are fully remote, back in the office, or a combination of both.</div></div></div>
</div><div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/cybersecurity-awareness-month-resource-kit-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/CS%20Awareness%20Month.png" size="medium" data-lightbox="false" style="width:624px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><span style="color:inherit;font-weight:700;">Here's what you'll get:</span></div><div><span style="color:inherit;font-weight:700;"><div style="color:inherit;"><ul><li><span style="font-weight:400;">Access to&nbsp;<strong>free resources for you</strong>&nbsp;including our most popular on-demand webinar and whitepaper</span></li><li><span style="font-weight:400;">Resources to help you plan your activities, including your&nbsp;<strong>Cybersecurity Awareness Month Guide&nbsp;</strong>and&nbsp;<strong>Cybersecurity Awareness Weekly Planner<br></strong></span></li><li><span style="font-weight:400;">Two free&nbsp;training modules for your users;&nbsp;<strong>&quot;Your Role: Internet Security and You</strong><strong>&quot;</strong>&nbsp;and&nbsp;<strong>&quot;2021 Social Engineering Red Flags,&quot;&nbsp;</strong>both available in multiple&nbsp;languages</span></li><li><strong><span style="font-weight:400;">Resources to share with your users</span></strong><span style="font-weight:400;">&nbsp;including Kevin Mitnick cybersecurity demo videos, infographics, tip sheets, awareness posters, and wallpapers</span></li><li><strong><span style="font-weight:400;">All assets are printable and available digitally</span></strong><span style="font-weight:400;">, so they can be delivered to your users no matter where they are working from&nbsp;</span></li></ul></div></span></div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/cybersecurity-awareness-month-resource-kit-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Get Your Free Resource Kit Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 01 Oct 2021 15:18:27 +0000</pubDate></item><item><title><![CDATA[Probability of Experiencing a Vendor Email Compromise Attack Increases 96%]]></title><link>https://www.actisofttechnology.com/blogs/post/probability-of-experiencing-a-vendor-email-compromise-attack-increases-96</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-836453798.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Vendor Email Compromise requires first taking control of a strategic email account within the victim ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/gef1f31aa752d3f1b4d534618bb365488fd303e7bacd59e35b9c6c9bd4c6307b965f927709fff7cd8b2961df9560b1789a4f8e3226bba916b49b091519d0fc506_1280.png" size="medium" data-lightbox="false" style="width:1280px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div><a href="/kcm-grc-vendor-risk" title="Vendor Email Compromise" target="_blank" rel="">Vendor Email Compromise</a> requires first taking control of a strategic email account within the victim organisations. According to new data, cybercriminals are getting really good at this.</div></div><div><br></div><div>Vendor Email Compromise – an attack where an email account is actually taken over rather than simply spoofed as seen in business email compromise attacks – can have a far greater impact on the organisation. Emails coming from a threat actor-controlled legitimate email account are much harder – if not impossible – to discern as being malicious in nature.</div></div></div></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.knowbe4events.com/kb4-con-emea?promo=0010c00001ywD8SAAU&amp;tr=true" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KB4-CON.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div>According to new data in Abnormal Security’s <a href="https://info.abnormalsecurity.com/threat-report-2021-q3.html" title="Q3 2021 Email Threat Report," target="_blank" rel="">Q3 2021 Email Threat Report,</a> email account takeovers are rising in both number and success rates:</div></div><div><ul><ul><li>The chance of experiencing a VEC attack has risen 96% over the last 12 months</li><li>Mid-sized companies are 43% likely to have at least one account takeover per quarter</li><li>Enterprises with 50K+ employees are 60% likely to be a victim of account takeover</li><li>The C-Suite is the most targeted group, at three times than VPs – the next targeted group</li><li>14% of account takeovers occur at department head levels within organizations</li><li>The average request in a VEC attack is $183,000, with the highest documented being $1.6 million</li></ul></ul></div><br><div><div>With the potential for VEC attacks to cost organisation’s millions annually, it’s first imperative to protect email accounts from the possibility of account takeover using multi-factor authentication and zero trust solutions that scrutinise requests to access email. It’s equally important to educate users involved with the organisation’s finances using <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> to maintain a sense of vigilance – even when a request comes from a legitimate source. It’s necessary to validate any unexpected requests using a separate communication medium to ensure the person believed to be asking is actually doing so.</div></div></div></div></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo: KCM GRC</h2></div>
<div data-element-id="elm_MaW2PHPS0buy854OEBJgrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MaW2PHPS0buy854OEBJgrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>The new KCM GRC platform helps you get your audits done in half the time, is easy to use, and is surprisingly affordable. No more: &quot;UGH, is it that time again!&quot;&nbsp;</div></div></div>
</div><div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/products-KCM2-3.png" size="medium" data-lightbox="false" style="width:800px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div>With KCM GRC you can:</div><div><ul><ul><li>Reduce the amount of time and money required to easily manage your compliance, risk and audit requirements</li><li>Automate reminders so you can quickly see what tasks have been completed, not met, and are past due</li><li>Simplify risk management with an intuitive interface simple workflow based on NIST 800-30.</li><li>Efficiently manage your third-party vendor risk requirements</li><li>Quickly implement compliance and risk assessment processes using KnowBe4's pre-built requirements and assessment templates</li></ul></ul></div></div></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Request Your Demo!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 20 Sep 2021 14:51:00 +0000</pubDate></item><item><title><![CDATA[Enterprise Organisations Have as Much as an 85% Chance of Receiving a BEC Attack Every Week]]></title><link>https://www.actisofttechnology.com/blogs/post/enterprise-organizations-have-as-much-as-an-85-chance-of-receiving-a-bec-attack-every-week</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-954712690.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Business Email Compromise is a multi-billion dollar business, representing 43% of all cybercrime last ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; margin-block-start:-14px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_3mjB-29c7RdhmDcheD_hTA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-533992794.jpg" size="medium" data-lightbox="true" style="width:591px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>Business Email Compromise is a multi-billion dollar business, representing 43% of all cybercrime last year. Despite it being dwarfed in the news by ransomware, it represents a growing and consistent threat.</div><div><br></div><div><div>We’ve seen recent rises in BEC activity – along with a number of other cyberattacks – in both frequency and cost. But BEC tends to get lost in the shuffle; particularly when <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a> news has ransoms in the millions of dollars and seems to happen every day. But BEC is just as impactful a cyberattack and, from the latest data, seems to be happening quite frequently.</div></div><div><br></div><div><span style="color:inherit;">Keep in mind that most BEC attacks are limited in scope to the one and only CFO in your organisation or a small group of individuals in the finance department. The good news is as the organisation grows, the number of BEC attacks won’t necessarily increase. The bad news is that threat actors only need to focus on a few people to be successful.</span></div></div></div></div></div>
</div></div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div><div>In addition to enterprises having a high probability of attack, according to Abnormal Security’s <a href="https://info.abnormalsecurity.com/threat-report-2021-q3.html" title="Q3 2021 Email Threat Report" target="_blank" rel="">Q3 2021 Email Threat Report</a>, businesses of every size are at risk:</div></div><div><br></div><div><ul><ul><li>Small organisations under 500 employees have a 42% probability of receiving a BEC attack each week</li><li>Mid-sized organisations, a 60-70% chance</li></ul></ul></div><br><div><div>Part of this growth is the expansion in operational methods used by cybercriminal groups seen on the dark web. <a href="https://intel471.com/blog/bec-cybercrime-underground" title="Posts on cybercrime forums have been spotted that attempt to recruit or outsource functions related to BEC scams" target="_blank" rel="">Posts on cybercrime forums have been spotted that attempt to recruit or outsource functions related to BEC scams</a> – particularly those looking for native-English speakers to help improve the credibility and efficacy of <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> elements in BEC attacks.</div></div><br><div><div><span style="color:inherit;">Because BEC relies pretty heavily on social engineering and spoofing companies, domains, and/or an individual, putting employees through <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> is an effective way to minimise the threat surface of phishing attacks and stop BEC attacks before they have an opportunity to make an organisation a victim.</span><br></div></div></div></div>
</div></div></div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.knowbe4events.com/kb4-con-emea?promo=0010c00001ywD8SAAU&amp;tr=true" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KB4-CON.png" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Can hackers spoof an email address of your own domain?</span><br></h2></div>
<div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-large zpimage-tablet-fallback-large zpimage-mobile-fallback-large "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Spoof.png" size="large" data-lightbox="false" style="width:349px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Are you aware that one of the first things hackers try is to see if they can spoof the email address of your CEO? If they are able to commit &quot;CEO Fraud&quot;, penetrating your network is like taking candy from a baby.</div><div><br></div><div>Now they can launch a &quot;CEO fraud&quot; spear phishing attack on your organisation, and that type of attack is very hard to defend against, unless your users are highly ‘security awareness’ trained.</div><div><br></div><div>Find out now if your domain can be spoofed. The Domain Spoof Test (DST) is a one-time free service. Run this test so you can address any mail server configuration issues that are found.</div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/domain-spoof-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try To Spoof Me!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 20 Sep 2021 08:31:00 +0000</pubDate></item><item><title><![CDATA[U.K. Organisations See Double the Number of Ransomware Attacks in the First Half of 2021]]></title><link>https://www.actisofttechnology.com/blogs/post/u.k.-organisations-see-double-the-number-of-ransomware-attacks-in-the-first-half-of-2021</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-475412566s.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman New analysis of ransomware incidents reported to the UK's Information Commissioner's Office (ICO) in ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_3mjB-29c7RdhmDcheD_hTA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-693352614.jpg" size="medium" data-lightbox="true" style="width:724px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div>New analysis of <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a> incidents reported to the UK's Information Commissioner's Office (ICO) in the first half of 2021 show a massive rise when compared to 2020.</div></div><div><br></div><div>Utilising incident data reported to the ICO, British cyber security organisation CybSafe has determined that 22% of all cyber incidents in the first six months of 2021 were attributed to ransomware attacks. This is double the 11% found in the first half of 2020.</div><div><br></div><div><span style="color:inherit;">This doubling of the number of reported attacks is troubling, but not surprising, as 35% of all U.K.&nbsp;</span><span style="color:inherit;">businesses experience ransomware attacks (with the global average being 37%), according to Sophos’ State of Ransomware 2021 report.&nbsp;</span><br></div></div></div></div>
</div></div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div><span style="color:inherit;">Additionally, 63% of U.K. businesses affected by ransomware reported their organisations' brand was negatively impacted, according to <a href="https://www.cybereason.com/hubfs/dam/collateral/ebooks/Cybereason_Ransomware_Research_2021.pdf" title="CyberReason’s Ransomware: The True Cost To Business" target="_blank" rel="">CyberReason’s Ransomware: The True Cost To Business</a> report, making ransomware a legitimate threat to business longevity in the U.K.</span><br></div></div><div><span style="color:inherit;"><br></span></div><div><div style="color:inherit;"><div>CybSafe’s analysis found that phishing was the primary cause of all cyber breaches reported to the ICO in the first half of this year, making up 40% of all successful attacks. Phishing continues to be a thorn in cybersecurity’s side, with some percentage of attacks finding their way past security solutions and into the Inbox where an unsuspecting user is fooled into clicking on malicious links and attachments.</div><br><div><div><span style="color:inherit;">It’s only through continual <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> that users will elevate their state of vigilance, always being on the lookout for malicious content and reducing whatever threat surface remains by the time an attack reaches the Inbox.</span><br></div></div></div></div>
</div></div></div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.knowbe4events.com/kb4-con-emea?promo=0010c00001ywD8SAAU&amp;tr=true" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KB4-CON.png" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free <span style="font-weight:700;">Ransomware Simulator Tool</span></h2></div>
<div data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?</div><p><br></p><div>KnowBe4’s &quot;RanSim&quot; gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.</div></div>
</div><div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/RanSim1.png" size="medium" data-lightbox="false" style="width:500px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Here's how it works:</div><p><span style="color:inherit;"><br></span></p><div><ul><ul><li>100% harmless simulation of real ransomware and cryptomining infections</li><li>Does not use any of your own files</li><li>Tests 21 types of infection scenarios</li><li>Just download the install and run it&nbsp;</li><li>Results in a few minutes!</li></ul></ul></div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Get RanSim!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 31 Aug 2021 07:28:00 +0000</pubDate></item><item><title><![CDATA[Can the Microsoft 365 Platform Be Trusted to Stop Security Breaches?]]></title><link>https://www.actisofttechnology.com/blogs/post/defending-against-ransomware-attacks-should-start-and-can-end-with-security-awareness-training1</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1484069560501-87d72b0c3669?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDE1fHxicmVhY2h8ZW58MHx8fHwxNjI5NTU3NDA0&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Lax security policies, a lack of security measures and solutions in place, and an expectation that Mi ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g3616026baed2d5e696c8211a6db3392309930754db25cdefdddf8c7664ef69c1acb3efb2ea2e1a55fd333d91fb9a1366c12549878c619520c1ee93c44e6acd6a_1280.jpg" size="medium" data-lightbox="false" style="width:1280px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div>Lax security policies, a lack of security measures and solutions in place, and an expectation that Microsoft will address any security issues is putting organisations at risk.</div><br><div><div>Microsoft has gone to great lengths to ensure their Microsoft 365 platform offers modern security measures to keep their customers' data safe. But according to <a href="https://www.hornetsecurity.com/en/security-information/microsoft365-email-security-survey/" title="new data from cloud email security provider Hornet Security" target="_blank" rel="">new data from cloud email security provider Hornet Security</a>, 25% of organisations have reported a known email-based security breach, and it begs the question “why?”</div></div></div></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="medium" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div>According to Hornet Security, a lot of the issue resides with organisations not taking advantage of security features – whether from Microsoft or a third-party:</div><div><ul><ul><li>33% of organisations are not using Microsoft’s multi-factor authentication (MFA)</li><li>Of those using MFA, 55% of organisations are not using Conditional Access which scrutinizes connection requests beyond just providing credentials and additional authentication factors</li><li>Only 43% leverage Microsoft’s data loss prevention policies to keep data from leaving the organisation</li><li>68% of organisations expect Microsoft to keep email safe from threats</li></ul></ul></div><br><div>What’s interesting is that almost none of these features (with the exception of MFA) address the core issue – phishing and compromised credentials. For every organisation that has experienced a security breach, there’s a phishing email riddled with social engineering tactics and, more importantly, a recipient user who engages and activates attacker’s malicious content.</div><div><br></div><div><div>It’s imperative that organisations recognise the need to follow the attack kill chain and see one of the weakest links is the user who unwittingly enables threat actors by falling for phishing scams. Users that undergo continual <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> are better equipped on a daily basis to see phishing attacks for what they really are and keep the organization safe by not playing their role in an email-based attack.</div></div></div></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo:&nbsp;<span style="font-weight:700;">Security Awareness Training</span></h2></div>
<div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/SAT.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilise users as your last line of defence. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!</span><br></p></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Save My Spot!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 20 Aug 2021 13:45:50 +0000</pubDate></item><item><title><![CDATA[Defending Against Ransomware Attacks Should Start (and Can End) With Security Awareness Training]]></title><link>https://www.actisofttechnology.com/blogs/post/defending-against-ransomware-attacks-should-start-and-can-end-with-security-awareness-training</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/gb4e62795cd16a8439b2fc1ed82c1697a961bf84e8f9fa89dd657012e391e6aef79c1bb4ccdd1108873ac6b30fadb1ebedbef324a7b2c4c4e03b1532613015d19_1280.png"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman The world’s most dangerous, expensive, and impactful cyb ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_3mjB-29c7RdhmDcheD_hTA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Medium/iStock-957855506.jpg" size="medium" data-lightbox="true" style="width:1288px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div> The world’s most dangerous, expensive, and impactful cyberattack can potentially be stopped with little more than a conscientious user who is paying attention. </div>
<br><div><div>It feels like every year I need to be saying “this year is the year of <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a>”. Every year the attacks become more frequent, the number of players increase, the ransom demands get larger, and the payouts reach new unprecedented levels.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</div></div>
<div><br></div><div><br></div></div></div></div></div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div> Most cybersecurity strategies focus on layering in security solutions that prevent, detect, and respond to any kind of malware-based attacks – which includes ransomware. One aspect of the attack chain that can have a material impact on the effectiveness of your ransomware defence is the very prevalent human element. In most cases, phishing attacks are the primary initial attack vector, causing your users to stand squarely in between the ransomware attack and your organisation. </div>
<div><br></div><div> No single security solution can stop every attack, so it makes sense that because ransomware gangs – in part – require users to interact with malicious email content to enable an attack, educating those users via Security Awareness Training to spot an attack to stop it from ever continuing. </div>
<div><br></div><div><div>So, your ransomware defence strategy should start with <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> because you have no guarantee that the next attack will be stopped by solutions. But a user can make the difference between a boring normal workday and one where your entire operations has come to a screeching halt.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</div></div>
</div></div></div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free <span style="font-weight:700;">Ransomware Simulator Tool</span></h2></div>
<div data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?</div><p><br></p><div>KnowBe4’s &quot;RanSim&quot; gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.</div></div>
</div><div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/RanSim1.png" size="medium" data-lightbox="false" style="width:500px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Here's how it works:</div><p><span style="color:inherit;"><br></span></p><div><ul><ul><li>100% harmless simulation of real ransomware and cryptomining infections</li><li>Does not use any of your own files</li><li>Tests 21 types of infection scenarios</li><li>Just download the install and run it&nbsp;</li><li>Results in a few minutes!</li></ul></ul></div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Get RanSim!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 20 Aug 2021 13:45:50 +0000</pubDate></item><item><title><![CDATA[79% of Employees Have Knowingly Engaged in Risky Online Activities in the Past Year]]></title><link>https://www.actisofttechnology.com/blogs/post/79-of-employees-have-knowingly-engaged-in-risky-online-activities-in-the-past-year</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-1208529039.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman With employees not believing that it’s important to personally worry about cyber security risks, they ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"] .zpimagetext-container figure img { width: 500px ; height: 333.33px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"] .zpimagetext-container figure img { width:500px ; height:333.33px ; } } @media (max-width: 767px) { [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"] .zpimagetext-container figure img { width:500px ; height:333.33px ; } } [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1611095566888-f1446042c8fc?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDI2fHx3b3JrJTIwZnJvbSUyMGhvbWV8ZW58MHx8fHwxNjI5MjE1MTk5&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" width="500" height="333.33" loading="lazy" size="medium" data-lightbox="false" style="width:1080px !important;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div>With employees not believing that it’s important to personally worry about cyber security risks, they also tend to believe they’re not a target, new data suggest as the reason for the risky behaviour.</div><div></div><br><div>In most cyberattacks, the employee plays some role – clicking on a malicious attachment, giving up their corporate credentials to an impersonated logon page on the web, or taking specific action because they were fooled into believing their CEO or boss told them to. So, it’s important for employees to not engage in risky online behaviours.</div></span></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"] .zpimagetext-container figure img { width: 300px ; height: 600.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"] .zpimagetext-container figure img { width:300px ; height:600.00px ; } } @media (max-width: 767px) { [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"] .zpimagetext-container figure img { width:300px ; height:600.00px ; } } [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600.00" loading="lazy" size="medium" data-lightbox="false" style="width:300px !important;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div><div>But according to new data from security vendor Thycotic, employees simply aren’t prepared and educated to think about corporate risk, let alone their role in helping to mitigate that risk. In their newly released <a href="https://thycotic.com/resources/global-cyber-security-research-results-2021/" title="Balancing Risk, Productivity and Security" target="_blank" rel="">Balancing Risk, Productivity and Security</a> report, Thycotic point out some specific insights that clearly point to how and why employees are creating risk:</div></div><div><ul><ul><li>45% see the organisation being at little or no risk of cyberattack</li><li>51% say IT should be solely responsible to protect the organisation from cyber threats</li><li>79% of employees have engaged in one or more risky activities that include sharing credentials with colleagues, using the same password across multiple sites, using unauthorised personal devices to conduct work, and allowing family members to use their corporate device</li></ul></ul></div><br><div><div>One of the reasons is clear from the report’s data: 56% of employees have received no <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> in the last year. Over half of employees aren’t having the concept of needing to be vigilant continually reinforced – so it’s no wonder these organisations are seeing employees introduce risk regularly.</div></div><br><div></div><div>If you want a vigilant and cyber security-minded employee, you need to continuously teach them about the importance of cyber vigilance. Otherwise, you’re going to end up with an organisation that is demonstrated by the Thycotic data.</div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo:&nbsp;<span style="font-weight:700;">Security Awareness Training</span></h2></div>
<div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"] .zpimagetext-container figure img { width: 300px !important ; height: 238px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"] .zpimagetext-container figure img { width:300px ; height:238px ; } } @media (max-width: 767px) { [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"] .zpimagetext-container figure img { width:300px ; height:238px ; } } [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/SAT.png" width="300" height="238" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilise users as your last line of defence. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!</span><br></p></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Save My Spot!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 18 Aug 2021 15:01:00 +0000</pubDate></item><item><title><![CDATA[BEC Attacks Are Targeting Lower-Level Employees]]></title><link>https://www.actisofttechnology.com/blogs/post/bec-attacks-are-targeting-lower-level-employees</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-668224090s.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman A new report from Barracuda found that most business email compromise (BEC) attacks are now targeting ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1079995870.jpg" size="medium" data-lightbox="false" style="width:791px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div>A new report from Barracuda found that most business email compromise (BEC) attacks are now targeting employees who aren’t in executive or financial roles.</div><br><div>“Many organisations focus their training and protection on who they perceive to be the most targeted individuals within the organisation—usually executive and finance teams,” Barracuda’s researchers write. “However, 77% of BEC attacks targeted employees in other departments. Attackers look for an entry point and a weak link within your organisation, and then they work their way to more valuable accounts. This highlights the need to secure and educate every employee to the same level.”</div></span></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="medium" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div><span style="font-weight:700;">Barracuda also found that one in five BEC attacks target employees in sales roles.</span></div><br><div></div><div>“Due to the nature of their role, sales reps are used to getting external messages from senders they haven’t communicated with before,” the researchers write. “At the same time, they are all connected with payments and with other departments including finance. For hackers, these individuals could be a perfect entry point to get into an organisation and launch other attacks.” They also have access to a lot of contacts</div><div><br></div><div><span style="font-weight:700;">IT departments were another prime target, with each IT employee being targeted by an average of forty attacks.</span></div><span style="font-weight:700;"><div></div></span><br><div>“When we look at the number of phishing emails targeting IT teams, although they received only 5% of the total number of attacks, each employee was targeted by 40 email attacks, which is well above average,” the researchers write. “IT staff has access to business-critical applications, so compromising their accounts can be extremely valuable to hackers as it will give them access to organisations’ security and IT infrastructure. Cybercriminals tailor their attacks to their victims, so there were barely any BEC attacks, which usually look for quick monetary return, targeting IT teams. However, when it comes to attacks that include phishing URLs designed to compromise accounts, IT was one of the top targets.”</div><br><div></div><div><div>New-school <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> can enable employees throughout your organisation to recognise and thwart <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> attacks.</div></div><br><div></div><div><div>Barracuda has the full <a href="https://assets.barracuda.com/assets/docs/dms/spear-phishing_report_vol6.pdf" title="story" target="_blank" rel="">story</a>.&nbsp;</div></div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo:&nbsp;<span style="font-weight:700;">Security Awareness Training</span></h2></div>
<div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/SAT.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilise users as your last line of defence. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!</span><br></p></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Save My Spot!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 18 Aug 2021 07:40:00 +0000</pubDate></item></channel></rss>