Resources

Blog

What is Quishing?

QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives. The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes,...
Blog

Using Generative AI Responsibly: Exploring 5 Common Use Cases

The rise of generative AI like ChatGPT and Midjourney has been one of this decade’s most revolutionary technological advancements. This technology has allowed businesses to scale their operations more efficiently and enabled entirely new functionalities within existing tools. While generative AI has had a largely positive impact on the world, its negative aspects cannot be...
Blog

Voice Generation AI: A Major Threat to Communication Carriers' Security Systems

Voice-based cyber attacks have existed for a long time and have wreaked havoc worldwide. They are a low-effort, high-reward attack that can be scaled to extreme heights with very little effort apart from finding phone number lists to call. This is part of the reason why vishing attacks have seen a 54% increase in 2022. A potentially even more aggravating factor is the recent...
Blog

AI in Cyber Security: Pros and Cons, and What it Means for Your Business

AI has been making waves in virtually every industry, and cyber security is no exception. Several companies are adopting the technology into different business functions, such as logistics and IT. But as AI quickly leaks into the business landscape, it’s also been the subject of criticism. Recently, news reports have revealed that ¾ of global businesses are considering or...
Blog

How Artificial Intelligence Benefits Cyber Security Awareness Training

AI is changing how people live and work. Thanks to intuitive machine learning systems, the ability to predict, personalize, and customize has reached new levels. These capabilities of prediction, personalization, and customization make AI the perfect match for cyber security awareness training. AI cyber security training lets you meet individual employee learning needs...
Blog

ChatGPT and Its Recent Cyber Security Scares

Conversational AI has lately been the talk of the town for most knowledge workers worldwide. While this technology has existed for a few years, OpenAI’s ChatGPT released this year is leaps and bounds ahead of anything seen before. This trailblazing web app has been used for anything from writing wedding speeches to helping people do their jobs more efficiently. One thing is...
Blog

Android vs iOS: Which Operating System is Safer?

Cellphones have seen one of the most dramatic technological growths of any hardware in recent history. From simple portable phones a few decades ago, they’ve become fully-fledged computers with their own OS and applications used daily by most people worldwide. Smartphones have become such a fixture of life, and hackers and scammers have been working to exploit these devices...
Blog

The Definitive Guide to Cyber Security in Cryptocurrency

Even after years of business evolution; it’s shocking that safe, quick and trackable payments are still often such a struggle for many companies around the world. Banks are often slow-moving institutions that are late to embrace technological improvements, and currencies have been increasingly fickle in recent years. This situation is what allowed cryptocurrency to go from the...
Blog

Are You Being Played? AI's Role in Social Engineering and How You Can Protect Yourself

While there’s no denying that AI has its advantages, it also comes with its fair share of drawbacks. One of which is its role in making social engineering easier to pull off. Cyber criminals are beginning to utilize AI software to generate the voice of chief executive officers and fool employees into revealing sensitive information or initiating monetary transfers. An...
Blog

The Crypto Crash: How it Affects Cyber Security in 2023 and What to Do About It

The crypto market has been on a wild ride over the past few years, with prices soaring to all-time highs in 2017 and then crashing just as dramatically in 2018. And while the market has been relatively stable in recent months, many experts predict another crash in 2023. But what does this mean for cyber security? In this article, we’ll explore the potential effects of the...
Blog

Yes, Cybercriminals Can Use ChatGPT to Their Advantage, Too

In the age of robots and artificial intelligence comes another player in the AI market: ChatGPT (Generative Pre-trained Transformer). Since its release, cyber security professionals have unlocked various opportunities with its features. Namely, it can answer prompts, write codes on demand, detect phishing emails, and crack passwords. In a nutshell, ChatGPT can be an invaluable...
Blog

Security Awareness and Working From Home: What About Devices with Personal Voice Assistants?

Personal voice assistants have proven to be a great technological innovation that improves lives daily. With 4.2 billion of these devices in use in 2020, they are no longer just a novelty, and, with workers staying home for the foreseeable future, voice assistants could pose a sizeable security risk. Voice assistants are mostly known as standalone speakers that people talk to...
Blog

This is Why You Need Mobile Responsive Security Awareness Training

(7 min read) Hint: It has everything to do with effective mobile learning. The past decade’s explosion of smartphone and tablet usage has magnified the importance of well-designed mobile responsive content as a vital part of any training program. Recent studies echo clear mobile learning preference statistics, including how: 70% of learners feel more motivated when training...
Guide

The Importance of Mobile Responsive Security Awareness Training White Paper

Download the White Paper to how to better engage users by: Giving them access to security awareness training from anywhere, on any device Providing an appealing, effective learning experience that fits everyone’s schedule Promoting better knowledge retention and lasting behavior change by leveraging mobile learning Implementing a seamless experience across desktops,...
Blog

Consumerization of IT Through BYOD: Is Your Company Ready?

The consumerization of IT is when employees use their own personal mobile devices, such as laptop computers, tablets, smart phones, etc. at work, referred to as BYOD (bring your own device). This use is becoming increasingly common and exposes companies to a variety of risks, including the protection of personal information. Canadian businesses appear to be leading the world...