Select Page
How to strengthen your cybersecurity with user research

How to strengthen your cybersecurity with user research

User research: How to conduct it, and wield its powers for good What makes a good movie? I’d argue that it’s characters with good backstories. There’s nothing more satisfying to me than seeing how a character’s past experiences shape their worldview. Than...
Security awareness is dead: 4 things holding your organization back

Security awareness is dead: 4 things holding your organization back

Is security awareness haunting your organization? Boo! No, that’s not the sound of the ghost of security awareness (which is dead, by the way). It’s the sound of us booing it—or, at least, booing the organizations that still put it on a pedestal. Security awareness...
How to make data backups a regular part of everyone’s day

How to make data backups a regular part of everyone’s day

Back to security basics: Let’s back things up a little Last time we explored how the simple lock screen keeps data out of the wrong hands. This time, we’re looking at a form of protection that always pays off: backups. Data loss is a very real danger, and it’s a major...
Why people are so attached to their dirty password habits

Why people are so attached to their dirty password habits

Last week, we talked about traditional security awareness and training, and why it doesn’t work. This time around, it’s all about passwords. On the whole, people have some questionable password habits which would make any security professional break out in a cold...
Survey says: RIP traditional security awareness and training

Survey says: RIP traditional security awareness and training

Last time, we looked at how (fiendishly simple) virtual private networks (VPNs) thwart cyberthreats. Today, we’re talking about the human risk management OG: security awareness and training (SA&T). But this isn’t about your regular 20-year-old syllabus. No, no...