Phriendly Phishing
Phriendly Phishing
  • Видео 22
  • Просмотров 129 258
Vulnerability Management Q&A - Security Expert, Mark Hofman, Answers Frequently Asked Questions
How should start-ups balance Vulnerability Management practices with the day-to-day requirements of growing a business?
How do you prioritise all the assets that need scanning within the network?
How do you know the scanning you’re doing is accurately identifying all the necessary vulnerabilities that need fixing?
Should you ban scanning from certain business-critical parts of the network to avoid the risk of disruption?
Get answers to all these questions and much more!
Vulnerability Management is the foundation of an effective cybersecurity program. It involves reducing attack surfaces and minimising the risk of devastating cyber breaches.
To be effective, your organisation’s approach needs to...
Просмотров: 9 087

Видео

Interview with Dion Devow - Aboriginal and Torres Strait Islander Community Leader
Просмотров 4034 года назад
In this interview Shearwater's David Halfpenny talks to Aboriginal and Torres Strait Islander community leader Dion Devow about indigenous communities and their relationship with IT and cyber security. They also discuss how to foster more indigenous representation in the IT industry.
Practical and Proven Ways to Improve Staff Cybersecurity Awareness
Просмотров 2565 лет назад
People are often accused of being the weakest link in the cybersecurity chain, and with good reason, but they don’t have to be. Shearwater’s David Halfpenny talks with behavioural modeling expert Marvin Oka from Behavioural Modelling Research about the reasons why people do insecure things and looks at practical suggestions around how you can improve your cybersecurity posture through your people.
Shearwater Purpose and Values
Просмотров 775 лет назад
We believe in complete openness and transparency, which sets us apart and builds the strong relationships we need to ensure a safer connected world. Our values are embedded in all that we do: Act with heart and soul Create magical customer experiences Take pride, own the outcome Speak freely and respectfully Have fun, as a team If you want to be a valued member of our team, please check out our...
3 Proven Pillars to Build a Security Awareness Culture
Просмотров 3825 лет назад
Security Awareness Training Tips Human error leads to the bulk of damaging breaches we see over and over again. This video will offer insights that will help you succeed in improving staff cybersecurity awareness and driving meaningful change. What to expect from this video: Most IT and security leaders recognise that staff security awareness should be a vital part of their security program. Bu...
Phriendly Phishing Security Awareness Training and Simulation
Просмотров 4595 лет назад
Damian Grace, Phriendly Phishing Founder and General Manager, discusses the negative impact of phishing and explains how effective security awareness helps prevent costly security incidents.
Shearwater Information Security Services
Просмотров 1975 лет назад
Company video highlighting our purpose and outlining the services we offer to organisations in Australia and the rest of the world.
How to Get Started with Cybersecurity Incident Response
Просмотров 12 тыс.5 лет назад
Shearwater’s Chief Technology Officer, Mark Hofman, shares his steps for building an Incident Response Plan to help you take control of a security incident. Framed around the common and costly Business Email Compromise (BEC) attacks, Mark offers actionable tips on setting up an incident response process and validating your incident response plans. You will learn about: What defines an incident ...
Securing your Cloud Data : Practical Advice to Mitigate Risk
Просмотров 1896 лет назад
Cloud computing undoubtedly delivers flexibility, efficiency and cost reduction - but as it continues to rapidly transform the way we use, store and access data, it also continues to introduce a host of new threats and security challenges. Outsourcing data does not mean outsourcing responsibility. As a business leader, you are now faced with the challenge of managing shared responsibility with ...
The Insider’s Guide to Building a Successful Security Awareness Program
Просмотров 1,4 тыс.6 лет назад
Includes an anatomy of a real-world BEC attack Shearwater’s Phishing and Security Awareness General Manager, Damian Grace, shares his steps for developing a security awareness program that achieves results. Backed by data from thousands of users, Damian will offer actionable tips and share lessons learned from organisations across different sizes and sectors. You will learn about: - Common secu...
Guide to Developing a Cybersecurity Strategy & Roadmap
Просмотров 35 тыс.6 лет назад
Download our "Guide to Developing a Cyber Security Roadmap" by visiting our website: www.shearwater.com.au/cybersecurity-roadmap-ebook/ Developing an effective security roadmap is a challenging process as it involves a number of moving parts that need to work together so you can make sure: - Your organisation is compliant - You have effective policies in place - You can detect vulnerabilities a...
Ransomware Reality Check - Separating Hype from Hurt
Просмотров 1587 лет назад
Do you feel overwhelmed with all the ransomware hype that’s out there? In a world full of catchy headlines and addictive social media feeds, security leaders are bombarded with more ransomware tips and tricks than they can possibly handle. They are left plagued by lingering questions. Where do I start? How do I know which tactic is right for my organisation? How do I get concrete results? And m...
Vulnerability Management 101 - Best Practices for Success [Complete Webinar]
Просмотров 63 тыс.7 лет назад
Download our Vulnerability Management eBook here: www.shearwater.com.au/vulnerability-management-ebook/ Most security leaders recognise that scanning for vulnerabilities should be a vital part of their security program. But running a vulnerability scan is just the tip of the iceberg. Ever wondered what you should be scanning in your environment, or how often you should be scheduling scans? And ...
5 Vital Tips for Vulnerability Managemet Success
Просмотров 937 лет назад
Get 5 quick tips on what's needed to establish vulnerability management program that works. In this summary we will cover how to: Establish a vulnerability management strategy Follow vulnerability management best practices Get the right tools, resources, and processes in place Feed vulnerability data into other tools for deeper intelligence Report and get the right information to the right peop...
How to make the most out of your vulnerability scanning tools
Просмотров 1317 лет назад
Vulnerability scanning tools can be valuable for a number of processes in an organisation. Such as post build validation, patch validation, application management, security certification discovery and validation, and asset management. Follow us on LinkedIn: au.linkedin.com/company/shear... Learn More About Our Vulnerability Management Services: www.shearwater.com.au/vulnerability-management-as-...
When should you schedule your vulnerability scans
Просмотров 717 лет назад
When should you schedule your vulnerability scans
What should you scan in your network
Просмотров 747 лет назад
What should you scan in your network
What tools do you (really) need for vulnerability management
Просмотров 2 тыс.7 лет назад
What tools do you (really) need for vulnerability management
Skills that a vulnerability management team has to have
Просмотров 1397 лет назад
Skills that a vulnerability management team has to have
How to setup the right processes for vulnerability management
Просмотров 3,2 тыс.7 лет назад
How to setup the right processes for vulnerability management
Why you need vulnerability management
Просмотров 1697 лет назад
Why you need vulnerability management
Educating Employees to Prevent Phishing Attacks
Просмотров 8768 лет назад
Educating Employees to Prevent Phishing Attacks