Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

 

Smishing & How to Protect Your Smartphone

We’ve talked about phishing… ya know, when you receive an email that tricks you into giving away...

Read More

CIB_phishing-1

    8 Ways to Secure Point of Sale (PoS)

    Point of Sale (PoS) Systems & How to Protect Them Cash is no longer king! Today we’re talking about...

    Security FUNdamentals: Device Security!

    Snippets to keep security basics top of mind for everyone!

    Security FUNdamentals: Data Classification

    Snippets to keep security basics top of mind for everyone!

    Security FUNdamentals: Secure Your Mobile Apps!

    Snippets to keep security basics top of mind for everyone!

    People: Criminally Underutilized in the Fight vs. Cybercrime

    Do you know the most powerful weapon in the war against cybercriminals? (Hint: it’s not antivirus). 

    How to Spot the Biggest Phish in the Sea

    When it comes to fishing, it’s usually the bigger the better. The same is true in the cyberworld:...

    6 Tell-Tale Signs of Targeted Phishing

    What do you get when you blend phishing and targeted social engineering? A highly effective...

    An Inside Job: Threats Among Us

    According to the 2019 Verizon Data Breach Investigation Report a third of all data breaches within...

    The Internet of (Unsecure) Things

    Imagine arriving home after a tricky day at work: the lights in your living room are automatically...

    Prev 2 3 4 5 6 Next