Blog

The CybSafe blog is a collection of stories, updates and guidance for people-centric security professionals.

 

If you want to change security behaviour, stop thinking like a security professional, start thinking like an entrepreneur.

In 1998, Evan Goldberg revolutionised an industry. This is what we can learn from his story.

Post-pandemic, CISOs are overlooking an important cyber defence

Following COVID, no CybSafe employee will be bound to a physical office. Instead, CybSafe will be joining the growing list of organisations “working from anywhere”. Not temporarily. Permanently. And not “working from home”. Working from anywhere. Questions about office hours and moving overseas quickly begin. They showcase people’s excitement. But they also highlight an interesting point – For months now, most security professionals have been desperate to “secure remote workers”. 

We thought we needed to secure remote workers. We were wrong.

Following COVID, no CybSafe employee will be bound to a physical office. Instead, CybSafe will be joining the growing list of organisations “working from anywhere”. Not temporarily. Permanently. And not “working from home”. Working from anywhere. Questions about office hours and moving overseas quickly begin. They showcase people’s excitement. But they also highlight an interesting point – For months now, most security professionals have been desperate to “secure remote workers”. 

Phishing Training: an intelligent approach

Phishing Training: an intelligent approach

Broadly speaking, most phishing training works in more or less the same way. An automated tool sends simulated phishing and spear phishing simulations to those within your organisation. The simulations fool some, but not others. The tests reveal precisely who has been...

read more
How can phishing affect a business?

How can phishing affect a business?

The consequences of phishing can be severe... It’s widely reported, for example, that tech giants including Facebook and Google sent as much as $100m directly to criminals following a spear phishing campaign that went on for more than two years. More often than not,...

read more
Why Phishing Training Is Important

Why Phishing Training Is Important

In 2017, an email prankster targeted the White House. The prankster’s goal was simple: to trick White House staff into responding to fraudulent emails for nothing more than a cheap thrill. With little to gain from the endeavour, the prankster’s efforts were basic. The...

read more
Can phishing be prevented?

Can phishing be prevented?

As phishing filters are far from perfect, can phishing ever really be prevented? Today, with phishing attacks on the rise and the cyber threat landscape constantly evolving, most companies employ some form of technological phishing filter to help prevent phishing....

read more
How to identify a phishing email

How to identify a phishing email

You’ve received an email. As no phishing filter can keep out 100% of all phishing attacks, there’s a chance the email could be malicious – no matter what it looks like. How do you check whether or not the email is a phishing attack?   Step 1: Is the email...

read more
Why are phishing attacks successful?

Why are phishing attacks successful?

Phishing attacks often seem rudimentary. With their spelling and grammar errors, blurry replicas of company logos and conspicuous twists on sender names, they should be easy to spot, shouldn’t they? So why is it, instead of dying down, phishing attacks are on the...

read more
How are phishing attacks used in identity theft?

How are phishing attacks used in identity theft?

People are more likely to be a victim of identity theft than any other type of cybercrime… and phishing can be a precursor In order to steal your identity, criminals need to get hold of your personal information. That’s all it really takes to begin opening bank...

read more
Are phishing attacks on the rise?

Are phishing attacks on the rise?

In 2018, some reports suggest the number of phishing attacks are falling. Is that really the case? Phishing attacks have been on the rise for a long time now. According to the UK government’s most recent cyber security breaches survey, they cause more data breaches...

read more

Stay up to date with the latest updates

Get updates

Don’t miss out! Subscribe for monthly updates from the ABC Community.

Submit your content

Submit your content for publication. Please review our publication guidelines first.

More about CybSafe

See how CybSafe can help you measure and track security behaviours to improve security controls and awareness activities.