Blogs

Without strong metrics that matter to the business, security awareness programs will continue to be the “bastard child of security”. We all know how little budget security gets, and of

For many channel partners, such as VARs and MSPs, cybersecurity-awareness training is a first stop in their quest to harden their customers’ networks against attack. That’s because the human element

It may be funny, but too many people don’t put serious effort into their passwords. Businesses can protect themselves against cyber threats by having all the latest and greatest layers

Online scams and attacks are surging and growing more sophisticated, conning thousands of people and companies out of millions of dollars. How to detect and avoid online scams Digital technology,

Introduction Have you ever wondered why you still fall for simple social engineer attack, even after you have undertaken a comprehensive security awareness training program that looks at cyber security

I was running a security awareness training session for some executives of one of our customers recently, when I put up on the projector, a sample phishing email. I asked

Let’s assume that you decide to do some extra work at home. You build a database to address a company issue, put company data, customer information or just some innocuous

Sextortion is back! In fact, it never went away. Some of us get dozens of sextortion scam emails every month to our work and personal accounts, demanding us to

Insider breaches — those caused by employees and leaders within an organization — are among the costliest and hardest to detect of all data breaches. Two-thirds of total data records

Everyone knows how crucial security is and how it must be embedded into everything an organisation does. A simple glance at the news provides details on the data breach of

Addressing human risk, compliance and appropriate controls isn’t as easy as just doing some email phishing, some training and then some more phishing. Many companies undertake these components, or maybe

Protecting critical data does not stop at securing the devices on your network or even the employees of your company. In an increasingly complex environment, it extends beyond an organisation’s