Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

 

What is a VPN? (and How to Use it Securely)

COVID-19 kicked off a mass exodus toward remote work. Since then, VPNs have become one of the...

Read More

CIB_phishing-1

Contact-Tracing: Lifesaver or Liability?

Across the world, governments and health authorities are working together to fight the COVID-19...

How to do Security Awareness Training for Remote Employees

Waging culture change is not an easy task. Trying to do that remotely feels near-impossible. But...

Fight Cyber Viruses the Way We Fight COVID-19

All viruses, cyber and biological, are known for spreading quickly and causing harm. The word virus...

Cloud Security Threats & 5 Tips for Mitigation

In 2005, if I asked you to tell me about the “cloud,” I imagine you might look up at the sky. Only...

The 7 Deadly Sins of Work From Home!

In 2020, there has been a mass exodus of people moving to remote workspaces to hide out from...

How to Securely Work from Home

With the recent outbreak of COVID-19, more and more companies are asking employees to work from...

Increased Use of Remote Work Creates Security Risks

Increased Remote Work is Highly Likely to Increase Cybersecurity Risks During The COVID-19 Pandemic

Security Awareness Training: Keepin’ Phish out of Water

Security Awareness Training: Keepin’ Phish out of Water When cybercriminals go phishing, they know...

How to create a cybersecurity program from scratch in 7 steps!

How to create a cybersecurity program? As the Chinese proverb says, the best time to plant a tree...

Prev 2 3 4 5 6 Next