NIST SP 800-171 prescribes 110 security requirements to protect the confidentiality of data. NIST SP 800-171A details 320 assessment procedures for these security requirements. The following blog explores in detail the first security requirement 3.1.1.
So what exactly is PFR and how should you go about tracking it? What should you do to make sure your patients are paying their bills promptly? Let’s get into it.
While hackers have many ways in which they create and send phishing emails, there are only a few key tips every user should know in order to stay safe. So, let’s take a look at the recommended method(s) for verifying an email’s legitimacy.
The SLAM Method sounds, well, aggressive. And I guess you could say it is, but in the sense that you will be better able to defend yourself against cybercriminals. Here’s everything you need to know about the SLAM method for fighting phishing.
How are you supposed to sift phishing emails into your trash? It all starts by understanding how to spot a phishing email…sending awareness emails also helps but that’s a different story.
One of the most effective ways to protect your organization is by sending phishing awareness emails to your employees. So what should you include in these emails in the first place?
The topics that you teach your team, how up-to-date they are and how they’re presented all have an impact on retention. Luckily, this blog post exists to give you the topics that your phishing training needs to include.
Here are a few phishing email examples and tactics that came straight out of our own inboxes. Luckily, none of these examples led to a breach or malicious attack.