The past few years has seen a radical change in how IT departments and employees think about end user computing. In the past, IT departments created a standard desktop image for corporate applications ...
I was first introduced to the limitations of ‘end user’ thinking a decade ago when I managed the rollout of an oil & gas exploration toolset. I expected clear processes and defined user roles. Instead ...
It always takes two for a phishing attack to work – an attacker to send the bait and an insider to take it. Almost every organization carries out some form of security and awareness training (SAT) to ...