Blog

The CybSafe blog is a collection of stories, updates and guidance for people-centric security professionals.

 

What exactly is security awareness?

Did you know that most cyber breaches occur due to human error? That’s because most people aren’t...

Why language matters in cyber security

Language is at the heart of communication. Every time we speak or write, we choose language appropriate to our audience to get our desired message across. Why should it be any different in cyber security?

Why are healthcare organisations targets for cyber attacks?

Healthcare services are under pressure. The Covid-19 pandemic has stretched them to their limit....
Phishing Training: an intelligent approach

Phishing Training: an intelligent approach

Broadly speaking, most phishing training works in more or less the same way. An automated tool sends simulated phishing and spear phishing simulations to those within your organisation. The simulations fool some, but not others. The tests reveal precisely who has been...

read more
Can phishing be prevented?

Can phishing be prevented?

As phishing filters are far from perfect, can phishing ever really be prevented? Today, with phishing attacks on the rise and the cyber threat landscape constantly evolving, most companies employ some form of technological phishing filter to help prevent phishing....

read more
How to identify a phishing email

How to identify a phishing email

You’ve received an email. As no phishing filter can keep out 100% of all phishing attacks, there’s a chance the email could be malicious – no matter what it looks like. How do you check whether or not the email is a phishing attack?   Step 1: Is the email...

read more
Why are phishing attacks successful?

Why are phishing attacks successful?

Phishing attacks often seem rudimentary. With their spelling and grammar errors, blurry replicas of company logos and conspicuous twists on sender names, they should be easy to spot, shouldn’t they? So why is it, instead of dying down, phishing attacks are on the...

read more
How are phishing attacks used in identity theft?

How are phishing attacks used in identity theft?

People are more likely to be a victim of identity theft than any other type of cybercrime… and phishing can be a precursor In order to steal your identity, criminals need to get hold of your personal information. That’s all it really takes to begin opening bank...

read more
Are phishing attacks on the rise?

Are phishing attacks on the rise?

In 2018, some reports suggest the number of phishing attacks are falling. Is that really the case? Phishing attacks have been on the rise for a long time now. According to the UK government’s most recent cyber security breaches survey, they cause more data breaches...

read more
The top 18 questions we get asked about CybSafe

The top 18 questions we get asked about CybSafe

CybSafe’s many technological innovations often intrigue audiences during demonstrations – and elicit questions that aren’t necessarily run-of-the-mill. For CISOs researching cyber security awareness platforms, the top 18 questions we get asked about CybSafe include:...

read more
Calculating your true phishing vulnerability

Calculating your true phishing vulnerability

Phishing vulnerability assessments and phishing susceptibility rates rarely tell the full story. How can companies calculate their true phishing risk? Have you ever wondered whether your reduced phishing susceptibility rate really shows your true phishing...

read more