Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

 

6 Tell-Tale Signs of Targeted Phishing

What do you get when you blend phishing and targeted social engineering? A highly effective...

Read More

CIB_phishing-1

An Inside Job: Threats Among Us

According to the 2019 Verizon Data Breach Investigation Report a third of all data breaches within...

The Internet of (Unsecure) Things

Imagine arriving home after a tricky day at work: the lights in your living room are automatically...

Anti-Social Media: 6 Ways Criminals Weaponize “Likes”

If you’re anything like the other 3.8 billion social media users around the world, you’re spending...

Tears for Fears: How to Avoid Social Engineers who Exploit Your Emotions

Can you believe how many people are likely to work remote ‘till 2021? It’s been a heck of a year,...

Five Types of Themed-Phishing Scams and How to Avoid Them

Curious about what’s new in the phishing world? Eager to know what bait cyber criminals are using...

Think You Can't Get Phished?! Here are Examples of COVID-themed Phishing that Might Change Your Mind

Have you recently received an email or text urging you to make an unexpected payment or buy...

Social Engineering and Re-Opening Society

Imagine you receive a message on Facebook from a good friend you haven’t seen for some time but...

Verizon DBIR 2020: A Feast for Security Awareness

Smell that? Ya. It's a whiff of the fresh, new Verizon Data Breach Investigations Report (DBIR) hot...

Zoom-Bombing: How Secure is Your Remote Meeting?

Have you ever considered holding an important business meeting in the middle of a crowded park...

Prev 1 2 3 4 5 Next