The 90-5-5 Concept: Your Key to Solving Human Risk in Cybersecurity

The 90-5-5 Concept: Your Key to Solving Human Risk in Cybersecurity

Introduction The difference between resilience and exposure often comes down to a single click. What if we told you that most breaches are not caused by advanced malware or zero-day exploits, but by everyday human mistakes? This is the essence of the 90-5-5 Concept: a framework that shifts the conversation from reactive defenses to proactive design. IBM, Stanford University and Verizon all highlight how human behavior, especially around everyday decision-making, is the dominant factor in…

Read More

Phishing is the top attack method used by threat actors

Phishing is the top attack method used by threat actors

The cyber threat landscape is constantly changing with new technology and cyberattack methods. Security leaders have worked to mitigate the risks associated with artificial intelligence (AI) while also working to meet a number of federal regulations and guidelines. IBM recently released their 2023 X-Force Threat Intelligence Index, analyzing cyberattacks throughout all of 2022. In almost one-quarter of all incidents remediated in 2022, the deployment of backdoors at 21% was the top action on objective. At…

Read More

Explorations in the spam folder: A sum greater than the parts

Explorations in the spam folder: A sum greater than the parts

Phishing is a problem that affects everyone, from the untrained to the highly skilled. It’s a problem that happens everywhere, from the office to the home. It comes through email, text, phone calls, etc. The location or means of delivery doesn’t matter—these criminals are going to target you where you are. If the location is one that you’re less likely to suspect, that’s all the better for them. The longer they can mask the scam—revealing…

Read More