Nearly a year ago, I wrote a blog post about how criminals are changing their approach to cybercrime. They are increasingly well capitalized, and they are investing resources in research and development, both in the areas of social engineering and the technical investigations of system vulnerabilities. Since I wrote that blog post, the criminals have continued to change. Cybercrime looks different today than it did a year ago. It will no doubt look different next year than it does this year. And, even as it gets more sophisticated and effective, it always gets bigger.
Then again, it’s not just the criminals that are changing. Technology changes constantly as well, and nearly every innovation presents new opportunities for criminal exploitation. This is particularly true as a result of poor management of new technology implementations. In a report published last spring, 63% of senior executives responding to a survey admitted their organizations roll out new technologies before putting security measures in place. That implies that roughly two-thirds of new technology implementations start out defenseless.
So not only are the criminals getting more adept, business is abetting them by creating new opportunities for them to exploit. The result is a fluid and constantly changing cybercrime landscape. It’s a lot to keep up with, and we are all dependent on end users to protect us. Criminals recognize that end users are the easiest way into your network, because even as hacking techniques develop, the overwhelming majority of outside attacks (which are the overwhelming majority of all attacks) occur through email, phishing, and bent websites.
In a constantly changing threat landscape, you can count on Logical Operations to change with the times. We have just updated the CyberSAFE course and credential to meet today’s cybersecurity standards. We have refreshed instructional text and graphics to meet current security standards as well as adding graphics that provide a better simulation of security principles discussed in the course. In addition, the updated CyberSAFE credential, CyberSAFE CBS-210, now covers four exam domains compared to three from the previous version. Certification now covers Compliance, Social Engineering, Device and Data Protection, and Online Security.
It doesn’t matter how effective your security systems or how strong your security policies are, ultimately your organization’s security depends on the choices and behavior of your end users. Everybody in your organization needs to learn to recognize and deal with cyber threats. Like it or not, in the modern organization, cybersecurity is everybody’s job.
Cybercrime and the methods of fighting it may both be changing, but there’s one thing that remains constant: end users are your first line of defense. If they have the basic cybersecurity skills to identify social engineering attempts and to recognize the signs of intrusion, if they know how devise passwords and how to keep their devices secure, then your information assets are that much safer from outside attack. To stay ahead of the latest cyber threats, we review the CyberSAFE program for potential content updates a minimum of two times per year. When your end users are CyberSAFE-certified and they keep their certifications up to date, you know you’ve taken the single most important step for securing your organization’s data.
The updated CyberSAFE training curriculum and credential are available for purchase now. For more information about the updates, or to learn how you can order CyberSAFE CBS-210, please contact email email@example.com or call 1.800.889.8350.