際際滷shows by User: StuSjouwerman / http://www.slideshare.net/images/logo.gif 際際滷shows by User: StuSjouwerman / Tue, 28 Apr 2015 13:38:48 GMT 際際滷Share feed for 際際滷shows by User: StuSjouwerman The 5 security awareness training generations [CARTOON] /slideshow/the-5-security-awareness-training-generations/47526991 the5securityawarenesstraininggenerations-150428133849-conversion-gate02
The 5 Security Awareness Training Generations. This is a fun cartoon that shows how to educate employees to stay safe online.]]>

The 5 Security Awareness Training Generations. This is a fun cartoon that shows how to educate employees to stay safe online.]]>
Tue, 28 Apr 2015 13:38:48 GMT /slideshow/the-5-security-awareness-training-generations/47526991 StuSjouwerman@slideshare.net(StuSjouwerman) The 5 security awareness training generations [CARTOON] StuSjouwerman The 5 Security Awareness Training Generations. This is a fun cartoon that shows how to educate employees to stay safe online. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/the5securityawarenesstraininggenerations-150428133849-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The 5 Security Awareness Training Generations. This is a fun cartoon that shows how to educate employees to stay safe online.
The 5 security awareness training generations [CARTOON] from Stu Sjouwerman
]]>
1699 1 https://cdn.slidesharecdn.com/ss_thumbnails/the5securityawarenesstraininggenerations-150428133849-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
The History of Hacking in 5minutes (for dummie) /slideshow/the-history-of-hacking-in-5minutes-for-dummie/30229287 historyofhackingin5minutes-140120161731-phpapp01
What do you do when you need to explain the history of hacking to a busy non-technical manager in five minutes or less? Here is an attempt to make this extremely complex subject into a 5-minute "cliff-note".]]>

What do you do when you need to explain the history of hacking to a busy non-technical manager in five minutes or less? Here is an attempt to make this extremely complex subject into a 5-minute "cliff-note".]]>
Mon, 20 Jan 2014 16:17:31 GMT /slideshow/the-history-of-hacking-in-5minutes-for-dummie/30229287 StuSjouwerman@slideshare.net(StuSjouwerman) The History of Hacking in 5minutes (for dummie) StuSjouwerman What do you do when you need to explain the history of hacking to a busy non-technical manager in five minutes or less? Here is an attempt to make this extremely complex subject into a 5-minute "cliff-note". <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/historyofhackingin5minutes-140120161731-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What do you do when you need to explain the history of hacking to a busy non-technical manager in five minutes or less? Here is an attempt to make this extremely complex subject into a 5-minute &quot;cliff-note&quot;.
The History of Hacking in 5minutes (for dummie) from Stu Sjouwerman
]]>
1702 3 https://cdn.slidesharecdn.com/ss_thumbnails/historyofhackingin5minutes-140120161731-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
10 Fun Short IT Horror Stories /slideshow/10-fun-short-it-horrorstories/29365034 10funshortithorrorstories-131219125314-phpapp01
Here are 10 predictions for 2014, all cyber attacks using social engineering to penetrate the network. Have fun reading, and I will try to report back in 12 months which ones came out as real. ]]>

Here are 10 predictions for 2014, all cyber attacks using social engineering to penetrate the network. Have fun reading, and I will try to report back in 12 months which ones came out as real. ]]>
Thu, 19 Dec 2013 12:53:14 GMT /slideshow/10-fun-short-it-horrorstories/29365034 StuSjouwerman@slideshare.net(StuSjouwerman) 10 Fun Short IT Horror Stories StuSjouwerman Here are 10 predictions for 2014, all cyber attacks using social engineering to penetrate the network. Have fun reading, and I will try to report back in 12 months which ones came out as real. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/10funshortithorrorstories-131219125314-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Here are 10 predictions for 2014, all cyber attacks using social engineering to penetrate the network. Have fun reading, and I will try to report back in 12 months which ones came out as real.
10 Fun Short IT Horror Stories from Stu Sjouwerman
]]>
5975 6 https://cdn.slidesharecdn.com/ss_thumbnails/10funshortithorrorstories-131219125314-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
The Seven Social Engineering Vices /slideshow/7-social-engineeringvices-23111743/23111743 7socialengineeringvices-130617095655-phpapp02
Cybercrime has gone "pro". The bad guys send you spear-phishing attacks and try to trick you into clicking on phishing links or open infected attachments. These slides explain today's hidden IT vulnerability and what the seven social engineering vices are that let the bad guys into an organization's network. ]]>

Cybercrime has gone "pro". The bad guys send you spear-phishing attacks and try to trick you into clicking on phishing links or open infected attachments. These slides explain today's hidden IT vulnerability and what the seven social engineering vices are that let the bad guys into an organization's network. ]]>
Mon, 17 Jun 2013 09:56:55 GMT /slideshow/7-social-engineeringvices-23111743/23111743 StuSjouwerman@slideshare.net(StuSjouwerman) The Seven Social Engineering Vices StuSjouwerman Cybercrime has gone "pro". The bad guys send you spear-phishing attacks and try to trick you into clicking on phishing links or open infected attachments. These slides explain today's hidden IT vulnerability and what the seven social engineering vices are that let the bad guys into an organization's network. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/7socialengineeringvices-130617095655-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cybercrime has gone &quot;pro&quot;. The bad guys send you spear-phishing attacks and try to trick you into clicking on phishing links or open infected attachments. These slides explain today&#39;s hidden IT vulnerability and what the seven social engineering vices are that let the bad guys into an organization&#39;s network.
The Seven Social Engineering Vices from Stu Sjouwerman
]]>
5352 8 https://cdn.slidesharecdn.com/ss_thumbnails/7socialengineeringvices-130617095655-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
7 social engineering_vices /slideshow/7-social-engineeringvices/22921506 7socialengineeringvices-130613085724-phpapp01
The Seven Deadly Social Engineering Vices. You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have the highest success rates, often approaching 100%. What is the secret of these attacks, how come they succeed so well? ]]>

The Seven Deadly Social Engineering Vices. You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have the highest success rates, often approaching 100%. What is the secret of these attacks, how come they succeed so well? ]]>
Thu, 13 Jun 2013 08:57:24 GMT /slideshow/7-social-engineeringvices/22921506 StuSjouwerman@slideshare.net(StuSjouwerman) 7 social engineering_vices StuSjouwerman The Seven Deadly Social Engineering Vices. You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have the highest success rates, often approaching 100%. What is the secret of these attacks, how come they succeed so well? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/7socialengineeringvices-130613085724-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Seven Deadly Social Engineering Vices. You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have the highest success rates, often approaching 100%. What is the secret of these attacks, how come they succeed so well?
7 social engineering_vices from Stu Sjouwerman
]]>
912 4 https://cdn.slidesharecdn.com/ss_thumbnails/7socialengineeringvices-130613085724-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
https://cdn.slidesharecdn.com/profile-photo-StuSjouwerman-48x48.jpg?cb=1567699373 KnowBe4, LLC is active in the area of Internet Security Awareness Training, Compliance, and IT security software. www.KnowBe4.com https://cdn.slidesharecdn.com/ss_thumbnails/the5securityawarenesstraininggenerations-150428133849-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-5-security-awareness-training-generations/47526991 The 5 security awarene... https://cdn.slidesharecdn.com/ss_thumbnails/historyofhackingin5minutes-140120161731-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-history-of-hacking-in-5minutes-for-dummie/30229287 The History of Hacking... https://cdn.slidesharecdn.com/ss_thumbnails/10funshortithorrorstories-131219125314-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/10-fun-short-it-horrorstories/29365034 10 Fun Short IT Horror...