Takes One to Know One: Think Like a Hacker for Better Security Awareness
52% of businesses experienced more malware infections as a result of employees on social media.
Security awareness is mostly about common sense, and thinking like the hackers to understand what security weaknesses they look for. But like other security precautions, it’s easy to let down your guard. Security awareness education can arm your staff with the skills to practice safe Internet usage – to reduce malware and other cyber threats. In this paper, find out:
- Best ways to deliver a security awareness program
- What you should teach your staff
- How to make security awareness a priority
Offered Free by: Trustwave
HackerProof: Your Guide to PC Security
This 53 page guide provides an objective, detailed, but easily understood walk through of PC security. The terms “PC security” or “computer security” are vague in the extreme. They tell you very little, like most general terms. This is because PC security is an incredibly diverse field. On the one hand you have professional and academic researchers who carefully try to find and fix security issues across a broad range of devices. On the other hand, there is also a community of inventive computer nerds who are technically amateurs (in the literal sense of the word – they’re unpaid and unsupported by any recognized institution or company) but are highly skilled and capable of providing useful input of their own.
PC security is linked to computer security as a whole, including issues like network security and Internet security. The vast majority of the threats that may attack your computer are able to survive only because of the Internet and, in some cases, the survival of a security threat is directly linked to a security flaw in some high-end piece of server hardware. However, the average PC user has no control over this. By the end of this guide you will know exactly what PC security means and, more importantly, what you need to do to keep your PC secure. Also with this free guide you will also receive daily updates on new cool websites and programs in your email for free courtesy of MakeUseOf.
Offered Free by: Makeuseof.com
Website Security Threat Report
Updates from Symantec’s Internet Security Threat Report. The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in attacks, malicious code activity, phishing, and spam. This shortened version of the report – the Website Security Threat Report – has been created to specifically focus on website security issues.
Offered Free by: VeriSign Authentication Services, now a part of Symantec Corp
The Essentials of Information Security Kit: Includes a Free PC Security Handbook – 2nd Edition eBook
Download this kit to learn everything you need to know about Information Security. The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions. The following kit contents will help you get the most out of your Information Security research:•The Big Shift to Cloud-based Security
- Best Practices and Applications of TLS/SSL
- PC Security Handbook – 2nd Edition
- IT Security. Are you in Control?
Offered Free by: TradePub
Web Application Security; How to Minimize Prevalent Risk of Attacks
Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention culprits such as “cross-site scripting,” “SQL injection,” and “buffer overflow.” Vulnerabilities like these fall often outside the traditional expertise of network security managers. To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security. The guide covers:
- Typical web application vulnerabilities
- Comparison of options for web application vulnerability detection
- QualysGuard Web Application Scanning solution
Offered Free by: Qualys, Inc.
Why Hackers Love Hotels, Restaurants and Other Businesses
Hackers are experts when it comes to stealing credit card data. Learn how to protect your business. In 2011 investigations, more than 85% of data breaches took place in restaurants, diners, retail stores and hotels. Hackers are experts when it comes to stealing your data…including the credit card numbers of your customers. Learn how to easily and quickly protect your business. View Why Hackers Love Your Business and find out:
- Why hackers are targeting your multi-site business
- What data they steal and why they don’t get caught
- What you can do to protect all your brand sites
Based on industry-leading research by Trustwave SpiderLabs, this on-demand webcast will give franchise and franchise-like businesses information to address their compliance and security challenges.
Offered Free by: Trustwave
CISO Guide to Next Generation Threats
Learn how to combat advanced malware, zero-day and targeted APT attacks. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Through constant testing of any suspicious code and blocking of communications with malicious hosts, next-generation protections combat advanced malware, zero-day and targeted APT attacks that bypass defenses like next-generation firewalls, IPS, antivirus, and Web gateways. The CISO guide is an executive-level overview of the problems faced by organizations dealing with targeted attacks and advanced, persistent threats.
Offered Free by: FireEye