Topic: employee training

  • GDPR Training: Turn Compliance into Competitive Advantage

    GDPR Training: Turn Compliance into Competitive Advantage

    Despite significant investment in GDPR compliance, many businesses struggle with employee security practices, risking heavy fines and reputational damage. Effective training requires role-specific, continuous education that integrates practical tools like password managers to foster lasting behav...

    Read More »
  • Australia's AI Adoption Outpacing Strategy, Warns Lucid

    Australia's AI Adoption Outpacing Strategy, Warns Lucid

    While 80% of Australian workers actively use AI tools, nearly half of businesses have only partially or not integrated AI into their core workflows, revealing a strategic shortfall. Employee-led adoption leads to fragmented AI use and unclear ROI, with only 46% of businesses achieving positive re...

    Read More »
  • 80% of AI Natives in Australia Still Prefer Human Support Option

    80% of AI Natives in Australia Still Prefer Human Support Option

    Four out of five Australian AI natives prefer access to human support during customer interactions, indicating a need for businesses to refine AI tools to meet expectations and encourage adoption. In the workplace, AI natives express lower satisfaction with employer-provided AI tools compared to ...

    Read More »
  • Your Employees Are Leaking Secrets to AI—And They Can't Get Them Back

    Your Employees Are Leaking Secrets to AI—And They Can't Get Them Back

    Employees are increasingly inputting sensitive corporate data into public AI platforms, often without the ability to recover or delete it, and many organizations lack technical measures to monitor or restrict this behavior. A significant gap exists between leadership's perceived oversight and act...

    Read More »
  • AI-Powered Hacking: How Clickfix Tools Are Breaching Systems

    AI-Powered Hacking: How Clickfix Tools Are Breaching Systems

    A 500% surge in Clickfix attacks in early 2025 highlights a shift toward AI-enhanced social engineering, where attackers use fake alerts to trick users into executing malicious commands, bypassing traditional security. AI is revolutionizing Business Email Compromise (BEC) by generating fabricated...

    Read More »
  • Cybersecurity Leaders Hide Cyber Incidents From Executives

    Cybersecurity Leaders Hide Cyber Incidents From Executives

    Corporate cybersecurity leaders are increasingly concealing security incidents from their own executive leadership and boards, creating a dangerous gap in understanding the organization's true risk profile and leading to decisions based on incomplete information. Nation-state cyberattacks are a p...

    Read More »
  • Two-Thirds of Firms Hit by Deepfake Attacks

    Two-Thirds of Firms Hit by Deepfake Attacks

    A majority of organizations (62%) experienced a deepfake attack in the past year, often using social engineering to impersonate leaders or manipulate automated verification systems. The threat is growing as deepfake technology becomes more accessible, with the combination of deepfakes and social ...

    Read More »
  • AI Skills Boost Salaries by 43%—Even Outside Tech

    AI Skills Boost Salaries by 43%—Even Outside Tech

    The demand for AI skills is driving significant salary premiums, with roles requiring even one AI skill paying an average of 28% more than those without. AI expertise is sought across diverse sectors beyond technology, including marketing, public relations, and scientific research, with skills va...

    Read More »
  • Can Your Phishing Detection Stop 2025's Security Threats?

    Can Your Phishing Detection Stop 2025's Security Threats?

    Social engineering attacks like Clickfix surged 500% in early 2025, with cybercriminals increasingly using AI to create sophisticated Business Email Compromise scams that exploit human psychology rather than technical vulnerabilities. Clickfix bypasses traditional defenses by tricking users into ...

    Read More »
  • How Hackers Poison AI and How to Stop Them

    How Hackers Poison AI and How to Stop Them

    Cybercriminals are leveraging AI to create sophisticated spam, malicious code, and phishing campaigns, while also directly targeting AI systems to exploit vulnerabilities. Attackers use AI to refine deceptive communications through A/B testing and exploit AI assistants and security tools, leading...

    Read More »
  • Railway Cybersecurity: Hackers Push the Limits

    Railway Cybersecurity: Hackers Push the Limits

    Railway networks are increasingly vulnerable to cybersecurity threats due to digital transformation, which introduces risks like remote system manipulation and potential accidents. Outdated infrastructure and extended equipment lifecycles complicate security, with many systems running on obsolete...

    Read More »
  • AI Will Transform Every Job, Says Walmart CEO

    AI Will Transform Every Job, Says Walmart CEO

    Walmart CEO Doug McMillon asserts that AI will fundamentally reshape every job across all sectors, emphasizing that this transformation does not necessarily mean mass layoffs but will require significant investment in employee upskilling. AI's impact extends beyond white-collar roles to all workf...

    Read More »
  • Cybercriminals Target Drug Formulas and Patient Data

    Cybercriminals Target Drug Formulas and Patient Data

    Cybercriminals target pharmaceutical companies for valuable clinical trial data, patient records, and proprietary formulas, posing significant financial and public health risks. Data breaches in the sector average $4.61 million per incident, with ransomware and third-party vulnerabilities leading...

    Read More »
  • AI's Success Hinges on Trusted, Well-Governed Data

    AI's Success Hinges on Trusted, Well-Governed Data

    Many businesses are struggling to implement AI effectively due to a lack of trusted, well-governed data, which is essential for reliable and secure outcomes. A significant challenge is the complexity and security risks associated with unstructured data, with many organizations citing budget const...

    Read More »
  • Hacker Stole Cisco Customer Data in Voice Phishing Scam

    Hacker Stole Cisco Customer Data in Voice Phishing Scam

    Hackers used a voice phishing (vishing) attack to compromise Cisco's customer data by manipulating an employee into granting unauthorized access to a third-party cloud CRM system. The breach exposed sensitive user information, including names, addresses, email addresses, and account metadata, tho...

    Read More »
  • Cybersecurity Journey: From Data Recovery to Battling Ransomware

    Cybersecurity Journey: From Data Recovery to Battling Ransomware

    The shift from data recovery to cybersecurity reflects the growing threat of ransomware, which disrupts operations and demands proactive defense strategies over reactive fixes. Modern cybersecurity requires skills like ransomware mitigation and secure data recovery, emphasizing prevention and tre...

    Read More »
  • Chanel & Pandora Hacked in Ongoing Salesforce Cyberattack

    Chanel & Pandora Hacked in Ongoing Salesforce Cyberattack

    Luxury brands Chanel and Pandora experienced data breaches via compromised Salesforce accounts, exposing customer information and highlighting third-party platform vulnerabilities. Stolen data (names, emails, addresses) can enable phishing and identity fraud, with experts warning about insufficie...

    Read More »
  • AI Security Risks: Even Experts Skip Oversight

    AI Security Risks: Even Experts Skip Oversight

    Cybersecurity teams are increasing AI security risks by using unapproved tools, with 86% of professionals admitting to unauthorized AI usage, often handling sensitive data. Shadow AI—unauthorized AI tool adoption—poses critical vulnerabilities, with 30% of respondents uploading internal documents...

    Read More »
  • Taco Bell Rethinks AI Drive-Thru Strategy After Setbacks

    Taco Bell Rethinks AI Drive-Thru Strategy After Setbacks

    Taco Bell is reassessing its AI drive-thru ordering system after facing operational issues and viral customer complaints, such as an incident where a customer ordered an excessive number of water cups to bypass the technology. The company acknowledges inconsistent AI performance and is allowing f...

    Read More »