Select Page

Rewind

All the content from last year’s PeepSec, Impact and flagship industry events

 

Stealing your company’s data is a piece of cake

Stealing your company’s data is a piece of cake

Would you like some data theft with your coffee? Last time, we explored auto-updates and why your people aren’t getting around to enabling them. This week’s topic is one that's just as easily overlooked.It goes like this. Your new marketing guy, Dave, is waiting for a...

read more
Security awareness is dead (or dying)

Security awareness is dead (or dying)

Security awareness is dead (or dying)The slow death of security awareness is happeningOver 90% of cyber security incidents are linked to people. So why are organizations only paying lip service to human cyber risk? Why are tick-box training and phishing simulations...

read more
Why are your people still snoozing updates?

Why are your people still snoozing updates?

Enabling auto-updates is more complicated than you think Last week, our CEO recommended a few ways to influence long-term security behaviors. This week, we’re jumping into auto-updates.“Change is the only constant.” That’s certainly true as far as IT is concerned....

read more
10 ways to influence long-term security behaviors

10 ways to influence long-term security behaviors

Just because your security awareness training is ‘engaging’ doesn’t mean it works   Creative, funny, and wildly engaging security awareness training doesn’t lead to lasting behavior change. What it does is make people say, “I really enjoyed your training and...

read more
Behave 1.0

Behave 1.0

Security awareness doesn’t translate to behavior change. But measuring and influencing security behaviors does. And that’s the focus of CybSafe’s Behave Series.

read more
A lesson on security behaviors

A lesson on security behaviors

It’s time you learnt your lesson about security behaviors Assign all the traditional security awareness training you want. Your people will probably attend every session and tick all the right boxes, but their security behaviors won’t change. But that doesn’t mean...

read more
It’s time to stop exposing yourself online

It’s time to stop exposing yourself online

In last week’s Behave Series blog, we explored phishing simulations, and how to put them to work in your organization.This week, we’re staging an intervention. Because you've just got to stop revealing so much of yourself to Internet strangers. Oh, and, we’re talking...

read more
A new approach to simulated phishing

A new approach to simulated phishing

A new approach to simulated phishingHow to run simulated phishing campaigns (the right way) and reduce your human cyber riskAnyone can be phished. Anyone. All it takes is the right email, sent at the right time, in the right situation. Yeah, that’s a lot of ‘rights’...

read more
Goodbye, security awareness training!

Goodbye, security awareness training!

It’s time to pull the plug on traditional security awareness training   We know it’s hard to let go. But this is getting out of hand. Traditional security awareness training has been on its deathbed for so long now that our eyes water whenever we get a whiff of...

read more
How to get phishing simulations right

How to get phishing simulations right

As part of our Behave Series last week, we talked about multi-factor authentication (MFA), and how to encourage your people to adopt it.This week, we’re diving into phishing simulations. They’re particularly useful for finding and filling the security cracks in your...

read more
Spotlight: Have you got the multi-factor?

Spotlight: Have you got the multi-factor?

Last week in our Behave Series blog we looked at passwords. This week we’re turning it up to 11. This week, we’re talking about multi-factor authentication (MFA). Multi-factor authentication. It’s the unsung hero of cybersecurity. It’s thwarted many a cybercriminal....

read more
Spotlight: Creating a passphrase ruleset

Spotlight: Creating a passphrase ruleset

This week we’re focusing on passwords. We know you’re no stranger to these, and neither are your workforce. But familiarity isn’t helpful here. In fact, it’s a criminal’s best friend.  Everyone in your business will have at least three or four passwords in their...

read more