It’s time to stop exposing yourself online

It’s time to stop exposing yourself online

In last week’s Behave Series blog, we explored phishing simulations, and how to put them to work in your organization. This week, we’re staging an intervention. Because you’ve just got to stop revealing so much of yourself to Internet strangers. Oh, and, we’re...
Goodbye, security awareness training!

Goodbye, security awareness training!

It’s time to pull the plug on traditional security awareness training   We know it’s hard to let go. But this is getting out of hand. Traditional security awareness training has been on its deathbed for so long now that our eyes water whenever we get a whiff of...
How to get phishing simulations right

How to get phishing simulations right

As part of our Behave Series last week, we talked about multi-factor authentication (MFA), and how to encourage your people to adopt it. This week, we’re diving into phishing simulations. They’re particularly useful for finding and filling the security cracks in your...
Spotlight: Have you got the multi-factor?

Spotlight: Have you got the multi-factor?

Last week in our Behave Series blog we looked at passwords. This week we’re turning it up to 11. This week, we’re talking about multi-factor authentication (MFA). Multi-factor authentication. It’s the unsung hero of cybersecurity. It’s thwarted many a cybercriminal....
Spotlight: Creating a passphrase ruleset

Spotlight: Creating a passphrase ruleset

This week we’re focusing on passwords. We know you’re no stranger to these, and neither are your workforce. But familiarity isn’t helpful here. In fact, it’s a criminal’s best friend.  Everyone in your business will have at least three or four passwords in their...