Resources

Latest cyber security news, views and insights.

How to identify a phishing email

How to identify a phishing email

You’ve received an email. As no phishing filter can keep out 100% of all phishing attacks, there’s a chance the email could be a phishing scam – no matter what it looks like. How do you check whether or not the email is a phishing attack? How to identify phishing...

read more
Why are phishing attacks successful?

Why are phishing attacks successful?

Phishing attacks often seem rudimentary. With their spelling and grammar errors, blurry replicas of company logos and conspicuous twists on sender names, they should be easy to spot, shouldn’t they? So why is it, instead of dying down, phishing attacks are on the...

read more
How are phishing attacks used in identity theft?

How are phishing attacks used in identity theft?

People are more likely to be a victim of identity theft than any other type of cybercrime… and phishing can be a precursor In order to steal your identity, criminals need to get hold of your personal information. That’s all it really takes to begin opening bank...

read more
Are phishing attacks on the rise?

Are phishing attacks on the rise?

In 2018, some reports suggest the number of phishing attacks are falling. Is that really the case? Phishing attacks have been on the rise for a long time now. According to the UK government’s most recent cyber security breaches survey, they cause more data breaches...

read more
The top 18 questions we get asked about CybSafe

The top 18 questions we get asked about CybSafe

CybSafe’s many technological innovations often intrigue audiences during demonstrations – and elicit questions that aren’t necessarily run-of-the-mill. For CISOs researching cyber security awareness platforms, the top 18 questions we get asked about CybSafe include:...

read more
Calculating your true phishing vulnerability

Calculating your true phishing vulnerability

Phishing vulnerability assessments and phishing susceptibility rates rarely tell the full story. How can companies calculate their true phishing risk? Have you ever wondered whether your reduced phishing susceptibility rate really shows your true phishing...

read more