Resources

Blog

5 Reasons to Integrate Microlearning Into Your Security Awareness Training Program

Ten words: knowledge retention, behavior change, real-time, attention spans, rich media. As a security leader in your company, chances are you see how rapidly the cyber landscape is changing and how quickly cyber threats are evolving. Phishing, data breaches, malware, ransomware, and more threats are getting more sophisticated with every new technology. These risks are expected to double by 2025...
Blog

Risky Business: When Third-Party Troubles Become Your Own

Businesses don’t stand and operate alone. Organizations partner with an average of 10 third-party vendors to manage their operations. Especially when talking about large corporations—they collaborate with various other organizations or firms helping them manage and advance their operations. These firms include suppliers, manufacturers, service providers, software vendors, distributors, resellers...
Blog

Here's How Abandoned Domain Name Can Become a Cyber Threat

Do you have old pages on your website that you’ve forgotten about? Obsolete projects with old domain names? Old pages that are no longer active? If so, beware. Those subdomains you’ve forgotten about can be highly valuable to cyber attackers. Keeping your organization’s website up-to-date typically means updating content. But while you focus on the new, don’t neglect any old domains or unused...
Blog

Why Transparency After a Data Breach is Important

It’s one of the scariest outcomes of a cyber attack. A data breach’s effect can easily bankrupt a company, and even if appropriately handled, its consequences are often felt for months or years to come. One of the biggest issues with data breaches, and what is often the most damaging outcome, is the loss of trust from customers. After all, if a breach happened once, how do you know it won’t...
Blog

Cyber Security Preparedness in a Hybrid World

Offices around the world have undergone a massive transformation in recent years. While a fully remote workforce remains offered by a minority of employers, the hybrid nature of workplaces is rapidly becoming the norm. A recent study by Cisco studied the cyber security challenges tied to a distributed workforce, and their cyber security readiness model created some troubling statistics. According...
Blog

Why Is Phishing Awareness Training Important?

The reality is simple. Phishing attacks are more prevalent than ever before. An estimated 3.4 billion fraudulent emails are sent out daily as part of phishing schemes, resulting in the FBI's Internet Crime Complaint Center (IC3) receiving over 651,800 phishing-related complaints annually. Adjusted losses for affected organizations topped $2.4 billion, costing them losses of up to $17,700 per...
Blog

How to Report a Phishing Email Scam: What You Need to Know

Over 3.4 billion phishing emails are sent out to unsuspecting recipients daily. At this rate, over 1 trillion email scams are deployed in one calendar year. The sheer enormity of these numbers makes it easier to understand how and why employees become victims of phishing email scams. Their typical email inbox is overflowing with emails from colleagues, partners, friends, family, third-party...
Blog

7 Signs of a Phishing Email

One of the most frequent attack vectors for cyber attackers is also one of the most used workplace applications. And you guessed it... that application is email. Thankfully, a lot of sophisticated technology these days can help protect organizations from cyber threats. Even so, this attack vector still puts your end users on the front lines of the cyber security threats. This means that to...
Blog

Wi-Fi Pineapple: What Do You Know About this Cyber Security Threat?

Carrying out a cyber attack is becoming more and more accessible. For a meager price of $99, anyone can now buy a platform to steal personal data and pose a cyber threat to organizations worldwide. This accessibility is made possible through the Wi-Fi Pineapple. Learn about this new cyber threat in this article and get tips on protecting your organization. What is a Wi-Fi Pineapple? A Wi-Fi...
Blog

How Scammers Are Using ChatGPT to Steal Credentials

Since its release, ChatGPT has been a hot topic, with more and more people growing to like it. Among the people who are enjoying the advantages of this AI tool are online scammers. Hackers use ChatGPT's popularity to trick users into downloading malware and stealing their personal information, making it a hotbed for phishing scams. Luckily, users can avoid falling prey to these scams and keep...
Blog

What's the Difference Between Smishing and Vishing?

An urgent voicemail message from the tax department. A text message from Microsoft tech support warning you about a problem with your computer. A caller asking you to confirm your mailing address and credit card number so you can collect your free prize. A text message requesting your confirmation of an Amazon shipment. These are all examples of smishing and vishing cyber attacks. They have one...
Blog

What's a Zero-Day Attack?

Users often just assume that the software tools they're using are in top working condition, and that's generally true. However, every change and every piece of new code introduces new potential for gaps, problems, and bugs. Sometimes cyber security is a race against time. What happens when a cyber attacker finds a hole before a security team does? What is a Zero-Day Attack? As soon as a...
Blog

How to Enhance Third Party Risk Management with Cyber Security Training

Did you know that on average, every company is connected to ten third-party businesses? There’s the payroll services company that remotely manages employee wages. The Software-as-a-Service (SaaS) cloud storage provider that backs up customer account data. The security company that provides access control to company buildings and systems. To achieve an efficient supply chain, organizations rely...
Blog

Management of technical vulnerabilities

Information systems are not equally safe or vulnerable to cyber attacks. Cyber criminals look for entry points that make it easier to break in, steal data, or do damage to systems. To illustrate, think of a burglary attempt. If an intruder has several houses to choose from, the one with an unlocked door and no security cameras is the easiest and most likely target. The process is similar to cyber...
Blog

Electric Vehicle Cyber Security: Are EVs Safe from Hackers?

It’s a simple fact: electric vehicles (EVs) are rapidly becoming a prominent fixture of everyday life. Global warming and climate issues are accelerating the adoption of this transportation method running on renewable energy. EVs also feature many technological innovations that make them attractive to buyers. So popular, in fact, that Gartner estimates there will be 2 million global public EV...
Blog

How to Build a Strong Security Awareness Training Program in 2023

Your employees are your first line of defense against cyber security attacks. The success or failure of your security awareness program depends on the knowledge of every employee in your organization. As part of your organizational goals and plans for 2023, you must prioritize building a cyber secure and aware culture. This requires an ongoing commitment not just among the average employees, but...
Blog

The 7 Major Concerns for Cyber Security Right Now

Cyber security is a constant battle against evolving threats. While most of the themes are the same, it is crucial to remain informed and up to date on the latest forms of every cyber threat. After all, 31% of executives said in a recent survey their main cyber security challenge was improper identification of key risks. Most companies around the globe have a cyber security awareness plan in...
Blog

Why Your Third-Party Vendors Have Almost Definitely Been Breached and What to Do About It

The news from Human Resources is that employees are happier than ever. Working from home using third-party vendor services makes work easier and more flexible. The news from IT is less enthusiastic. A recent report showed that a whopping 98% of organizations have at least one third-party provider that has suffered a data breach in the last two years. Third-party vendor relationships are nothing...
Blog

Four Ways to Make Cyber Security Employee Training Fun

Let’s be honest: cyber security employee training has a reputation for being dull. Most employees dread it. They expect dry training talks, lackluster presentations, and examples they can’t relate to. In any training, people must come first. You should create a model that focuses on the people you’re trying to reach: your own employees.  A people-centric approach lets you focus your cyber...