Blog

Blog

Getting Safe Cybersecurity Habits to Stick with Gamification and Positive Reinforcement

The first challenge security professionals who want to implement security awareness training face is that this training is usually perceived as a punishment or a chore. This perception varies based on how the training is contextualized, its delivery method, and the organizational culture in which it is introduced. As the renowned psychologist and behaviorist B.F. Skinner put it, “The behavior of...
Blog

5 Reasons Why You Need Gamification In Your Cyber Security Awareness Program

There's a reason why video games are such a popular pastime for adults and children alike. They keep the users engaged by dividing the steps required to accomplish a task and rewarding them at every step of the way through points or in-game items. This strength leads to more immersion for the player and creates a sense of involvement with the content and story. The concept that makes this a...
Blog

Security Awareness and Working From Home: What About Devices with Personal Voice Assistants?

Personal voice assistants have proven to be a great technological innovation that improves lives daily. With 4.2 billion of these devices in use in 2020 , they are no longer just a novelty, and, with workers staying home for the foreseeable future, voice assistants could pose a sizeable security risk. Voice assistants are mostly known as standalone speakers that people talk to in order to execute...
Blog

Why Gamify Security Awareness Training?

Leveraging a spirit of competition to drive engagement and create a security culture Gamification is a popular concept these days, and for good reason. With gamification, you can develop a game for learning more about a serious topic while also getting the learner to approach winning that game with the same fervor they would when playing for entertainment. So what happens when you integrate...
Blog

Consumerization of IT Through BYOD: Is Your Company Ready?

The consumerization of IT is when employees use their own personal mobile devices, such as laptop computers, tablets, smart phones, etc. at work, referred to as BYOD (bring your own device). This use is becoming increasingly common and exposes companies to a variety of risks, including the protection of personal information. Canadian businesses appear to be leading the world in IT consumerization...