Blog

The CybSafe blog is a collection of stories, updates and guidance for people-centric security professionals.

 

How to build good cyber security habits

We are all creatures of habit. Some habits we’d rather get rid of. But others can be beneficial....

Three approaches to help you stay secure with remote working

The way we work is changing. Our approach to cyber security needs to change too.   Remote...

The 4 key factors for a successful phishing simulation

Phishing attacks are a problem. Over the past year, 88% of professionals  reported an increase in...
What we learned at PeepSec 2019 – Part II

What we learned at PeepSec 2019 – Part II

What we learned at PeepSec 2019 - part two   This is Part Two of a post reviewing key takeaways from PeepSec 2019. You can read Part One here. To access the free video recordings of every talk from PeepSec 2019, register here. Day three   JLT CISO Simon Legg...

read more
What we learned at PeepSec 2019 – Part I

What we learned at PeepSec 2019 – Part I

    Following its inauguration in 2018, PeepSec returned in 2019 to facilitate further discussion on the opportunities and issues born from the interactions between people and technology. Over five days, 30 experts offered world-leading insights into areas...

read more
Phishing Training: an intelligent approach

Phishing Training: an intelligent approach

Broadly speaking, most phishing training works in more or less the same way. An automated tool sends simulated phishing and spear phishing simulations to those within your organisation. The simulations fool some, but not others. The tests reveal precisely who has been...

read more
Can phishing be prevented?

Can phishing be prevented?

As phishing filters are far from perfect, can phishing ever really be prevented? Today, with phishing attacks on the rise and the cyber threat landscape constantly evolving, most companies employ some form of technological phishing filter to help prevent phishing....

read more
How to identify a phishing email

How to identify a phishing email

You’ve received an email. As no phishing filter can keep out 100% of all phishing attacks, there’s a chance the email could be malicious – no matter what it looks like. How do you check whether or not the email is a phishing attack?   Step 1: Is the email...

read more
Why are phishing attacks successful?

Why are phishing attacks successful?

Phishing attacks often seem rudimentary. With their spelling and grammar errors, blurry replicas of company logos and conspicuous twists on sender names, they should be easy to spot, shouldn’t they? So why is it, instead of dying down, phishing attacks are on the...

read more

Stay up to date with the latest updates

Get updates

Don’t miss out! Subscribe for monthly updates from the ABC Community.

Submit your content

Submit your content for publication. Please review our publication guidelines first.

More about CybSafe

See how CybSafe can help you measure and track security behaviours to improve security controls and awareness activities.