Hack a punch: Why intelligent phishing simulation is vital in the fight against scammers Your friend Andy’s always been interested in kickboxing. So he joins a beginner’s class where he rehearses all the moves and works on his fitness. Bit by bit, he perfects his form...
From meh to mega-metrics: How to measure the impact of your security awareness training You move into a new house—congratulations! It’s beautiful. Period features. Original wooden floors. One of those shiny overhead showers. Views for days. One downside: The basement...
What you need to know about assessing your cybersecurity culture Security culture. It’s not a new concept. The phrase has been thrown around for years and years. But in that concept lies a few challenges. Like defining its shape, parameters, where it starts, and...
What are the four types of security awareness training, and what can they do? Classroom-based training Web-based training Simulated attacks Computer-based training Your friend Mona is desperate to learn how to play guitar. So one day she buys a book called The...
Ah, don’t you love living in the world of cyber threats? Where traditional security measures won’t be enough to keep your organization safe. Lovely here, isn’t it? Why didn’t we all go with our five-year-old self’s career aspirations and go into donut testing?...
Ransomware trends 2023: The lowdown on today’s cyber shakedowns Ransomware is a cybercrime veteran. It’s got decades of devastation under its belt, and has made billions for people of a shady inclination. And it’s the fastest growing form of cyber attack today. The...