ROI
Return on Investment - ANSWER -The comparison between any expected
improvement
and the cost required to achieve that improvement
-In IT Security, this is measured as "reduction in risk"
not as a concrete financial gain
*Without proper SAT like KB4, a company can:
-loss of reputation
-lose productivity and revenue
Phish Prone Percentage - ANSWER -A number that indicates the % of
employees that are
prone to clicking on dangerous phishing links
-KB4 coined the term and offers a free test for
prospective customers to determine their company's
phish-prone percentage
-There is a company Phish prone % and an individual
Phish prone %
Security Policy - ANSWER -A written document that states how an
organization
plans to protect its physical assets and information
Phishing - ANSWER -Attempting to acquire sensitive info such as username,
password, credit card info by masquerading as a trustworthy entity using bulk
email which tries to evade spam filters
-It's a form of criminally fraudulent "social engineering"
Rootkit - ANSWER -Software that consists of one or more programs
designed to obscure the fact that a PC or Server has
been compromised
, -Began to appear once hackers began to mature and
become more sophisticated
BYOD - ANSWER BYOD = Bring your Own Device
-If an employee brings a personal device to use on your network and that device
is at risk of a malware infection, it is an easy way for hackers to hack into the
network
Kevin Mitnick - ANSWER -A former hacker (world's most wanted hacker
during mid-90s), now a successful security consultant and author
-With his 30+ years of experience with hacking and social engineering, KB4
created its security awareness training
-Part owner of KB4 (CHO) Chief Hacking Officer
Botnet - ANSWER -A collection of software bots that live on infected PCs and
run on its own.
-Can send spam, attack other PCs or web servers or send back confidential data
to the botnet command-and-control (CBC) servers. Those are managed by a bot
hoarder
PST
Phishing Security Test - ANSWER -A simulated phishing attack done by KB4
on email addresses that a prospect or customer uploads to our site
-We offer a one-time free PST to companies to use on their employees
-A way for KB4 to generate leads
KCM
KnowBe4 Compliance Manager - ANSWER -Software as a service (SaaS)
-Consolidates tasks for audits and regulation compliance and puts them into
simple automated workflows which prevent overlap and eliminates gaps
-Includes pre-built and up to data compliance templates. These are updated as
regulations are updated
-Includes "audit evidence vault" -safely secures policies, procedures, and
compliance/audit evidence for each of your controls and tasks
Return on Investment - ANSWER -The comparison between any expected
improvement
and the cost required to achieve that improvement
-In IT Security, this is measured as "reduction in risk"
not as a concrete financial gain
*Without proper SAT like KB4, a company can:
-loss of reputation
-lose productivity and revenue
Phish Prone Percentage - ANSWER -A number that indicates the % of
employees that are
prone to clicking on dangerous phishing links
-KB4 coined the term and offers a free test for
prospective customers to determine their company's
phish-prone percentage
-There is a company Phish prone % and an individual
Phish prone %
Security Policy - ANSWER -A written document that states how an
organization
plans to protect its physical assets and information
Phishing - ANSWER -Attempting to acquire sensitive info such as username,
password, credit card info by masquerading as a trustworthy entity using bulk
email which tries to evade spam filters
-It's a form of criminally fraudulent "social engineering"
Rootkit - ANSWER -Software that consists of one or more programs
designed to obscure the fact that a PC or Server has
been compromised
, -Began to appear once hackers began to mature and
become more sophisticated
BYOD - ANSWER BYOD = Bring your Own Device
-If an employee brings a personal device to use on your network and that device
is at risk of a malware infection, it is an easy way for hackers to hack into the
network
Kevin Mitnick - ANSWER -A former hacker (world's most wanted hacker
during mid-90s), now a successful security consultant and author
-With his 30+ years of experience with hacking and social engineering, KB4
created its security awareness training
-Part owner of KB4 (CHO) Chief Hacking Officer
Botnet - ANSWER -A collection of software bots that live on infected PCs and
run on its own.
-Can send spam, attack other PCs or web servers or send back confidential data
to the botnet command-and-control (CBC) servers. Those are managed by a bot
hoarder
PST
Phishing Security Test - ANSWER -A simulated phishing attack done by KB4
on email addresses that a prospect or customer uploads to our site
-We offer a one-time free PST to companies to use on their employees
-A way for KB4 to generate leads
KCM
KnowBe4 Compliance Manager - ANSWER -Software as a service (SaaS)
-Consolidates tasks for audits and regulation compliance and puts them into
simple automated workflows which prevent overlap and eliminates gaps
-Includes pre-built and up to data compliance templates. These are updated as
regulations are updated
-Includes "audit evidence vault" -safely secures policies, procedures, and
compliance/audit evidence for each of your controls and tasks