Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

Webinar Series: Keeping Our Loved Ones Safe Online

We live in a digital world where everyone is connected like never before. It’s created amazing...

The Top Cybersecurity Threats Around Valentine’s Day

As Valentine's Day approaches, many people are focused on love, chocolate, and flowers—but...

How Neuroscience-Based Security Training Can Keep Employees Engaged

Many organizations struggle with this one question: Why isn’t our security awareness training...

Webinar Series: Building a Successful Security Champions Program

Is your company built of Security Champions? The best cybersecurity weapon you have at your...

How To Make Cybersecurity Training for Employees at Home Effective

It’s 2022, and many companies still haven’t asked their remote employees to return to the office....

Takeaways From the Biggest Cyber Attacks of 2021

Cyber attacks have been on the rise year after year, and 2021 has been no exception. Cybersecurity...

What is Human Risk Management? Why Should Cybersecurity Pros Care?

If you’ve ever heard “Risk Management” and immediately thought “here comes the jargon,” you’re not...

A Holiday Gift from Living Security - Our Most Downloaded Mini-Campaigns in a Box of 2021

Can you believe 2021 is almost over? This year has just flown by! It has also been another...

How To Train and Protect Your Employees From Future Phishing Attacks

Phishing is the second costliest attack vector when it comes to breaches, according to the IBM 2021...

2022 Security Awareness Training Calendar

As we wrap up 2021 and look to the year ahead, we have been interviewing Our Fortune 500 customers...

5 Cybersecurity Challenges COVID Created in the Healthcare Industry

Over the past two years, healthcare systems have been inundated with patient occupancy like never...

The Future of Cybersecurity in 2022 and Beyond

As any security professional is all too aware, cybersecurity is continuously evolving in light of...