Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

 

4 Big Reasons Security Awareness Program Owners Need Living Security

Security Awareness Program Owners face one seemingly insurmountable challenge: getting company-wide...

Read More

CIB_phishing-1

    Internet Safety for Kids: A Parent’s Cheat Sheet

    June is National Internet Safety Month, making it the perfect time to educate yourself on how to...

    June is National Internet Safety Month & Here’s How You Can Still Prepare

    Security Awareness Program Owners try to keep up with all the major “security-themed” holidays, but...

    Mobile Security: Cya L8R Cybercriminals

    Let’s be real: our mobile phones are the hardest-working technological presence in our lives. The...

    5 Tips for Proving the ROI of Your Security Awareness Training

    “What’s the ROI?” they demand, every time you ask for more support for your cybersecurity awareness...

    How to Develop a Security Awareness Training Program

    If you’ve just stepped into a new role as a Security Awareness Program Owner, you may have big...

    6 Metrics to Track in Your Cybersecurity Awareness Training Campaign

    Security Awareness Program Owners know that proving ROI to the big wigs is no easy feat. While you...

    How to Make Your Cybersecurity Program Feel like Cybersecurity Awareness Month (CSAM), Every Month

    National Cybersecurity Awareness Month (CSAM): it’s the time of the year Security Awareness Program...

    Passwords: The Magic Words Which Shall Not Be Named

    How many times a day do you type in a password? Probably a lot. Like, a lot a lot. Enough to do it...

    5 Ways to Reward Your Team During Cybersecurity Awareness Training

    You’ve put your heart and soul into crafting a diverse cybersecurity awareness training program....

    Prev 1 2 3 4 5 Next