• Boot camps & training
  • Awareness & anti-phishing
  • Community
Infosec Resources Home
  • Topics
    • Cyber ranges
      Threat Intelligence
      General security
      Hacking
      Healthcare information security
    • Penetration testing
      Phishing
      Data breach
      Insider threat
    • Capture the flag (CTF)
      Data recovery
      DoD 8570
      Security awareness
      + View All
  • Certification prep
    • CISSP
      CCSP
      CGEIT
      CEH
      CCNA
    • CISA
      CISM
      CRISC
      A+
      Network+
    • Security+
      CASP+
      PMP
      CySA+
    • CMMC
      CSIH
      Microsoft Azure
      Other
      + View All
  • Career guidance
    • IT auditor
      Cybersecurity architect
      Cybercrime investigator
      Penetration tester
    • Cybersecurity consultant
      Cybersecurity analyst
      Cybersecurity engineer
      Cybersecurity manager
    • Incident responder
      Information security auditor
      Information security manager
      + View All
  • Events
  • Podcast
  • About
    • Contributors
  • Search
  • Main Menu
Twitter LinkedIn

Susan Morrow

Susan has worked in the IT security sector since the early 90s; working across diverse sectors such as file encryption, digital rights management, digital signing, and online identity. Her mantra is that security is about human beings as much as it is about technology.

Page 15

Phishing May 12, 2017 Susan Morrow
Dropbox Phishing Attacks- Templates and Examples
Dropbox, the handy Cloud based storage for files, has been one of those amazing tech success stories. As of May 2016, Dropbox had over 500 million registered...
Hacking February 1, 2017 Susan Morrow
How Healthy is Security Across Healthcare?
For the first time, 2016 saw the American Medical Association (AMA) placing health data security within their top nine issues affecting physicians (1). This...
Phishing October 25, 2016 Susan Morrow
Phishing by Numbers – Phishing Infographic
Try out SecurityIQ - our phishing simulator for free. Phishing by Numbers The manipulation of human behaviour for criminal intent is nothing new. Age old...
Insider threat September 4, 2016 Susan Morrow
Insider Threats at Hospitals
Insider threat is an umbrella term for a number of different malicious acts carried out against an organization by someone inside that organization. It covers...
  • ‹
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
Infosec Resources Home

Join our newsletter

Get the latest news, updates & offers straight to your inbox.
  • This field is for validation purposes and should be left unchanged.
© 2021 Infosec Resources
  • Privacy Policy
Topics
  • Cyber ranges
  • Threat Intelligence
  • General security
  • Hacking
  • Healthcare information security
  • Penetration testing
  • Phishing
  • Data breach
  • Insider threat
  • Capture the flag (CTF)
  • Data recovery
  • DoD 8570
  • Security awareness
  • + See All Topics
Certifications
  • CISSP
  • CCSP
  • CGEIT
  • CEH
  • CCNA
  • CISA
  • CISM
  • CRISC
  • A+
  • Network+
  • Security+
  • CASP+
  • PMP
  • CySA+
  • CMMC
  • CSIH
  • Microsoft Azure
  • Other
  • + See All Certifications
CyberSecurity Careers
  • IT auditor
  • Cybersecurity architect
  • Cybercrime investigator
  • Penetration tester
  • Cybersecurity consultant
  • Cybersecurity analyst
  • Cybersecurity engineer
  • Cybersecurity manager
  • Incident responder
  • Information security auditor
  • Information security manager
  • + See All Careers