Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

 

Anti-Social Media: 6 Ways Criminals Weaponize “Likes”

If you’re anything like the other 3.8 billion social media users around the world, you’re spending...

Read More

CIB_phishing-1

    Tears for Fears: How to Avoid Social Engineers who Exploit Your Emotions

    Can you believe how many people are likely to work remote ‘till 2021? It’s been a heck of a year,...

    Five Types of Themed-Phishing Scams and How to Avoid Them

    Curious about what’s new in the phishing world? Eager to know what bait cyber criminals are using...

    Think You Can't Get Phished?! Here are Examples of COVID-themed Phishing that Might Change Your Mind

    Have you recently received an email or text urging you to make an unexpected payment or buy...

    Social Engineering and Re-Opening Society

    Imagine you receive a message on Facebook from a good friend you haven’t seen for some time but...

    Verizon DBIR 2020: A Feast for Security Awareness

    Smell that? Ya. It's a whiff of the fresh, new Verizon Data Breach Investigations Report (DBIR) hot...

    Zoom-Bombing: How Secure is Your Remote Meeting?

    Have you ever considered holding an important business meeting in the middle of a crowded park...

    What is a VPN? (and How to Use it Securely)

    COVID-19 kicked off a mass exodus toward remote work. Since then, VPNs have become one of the...

    Contact-Tracing: Lifesaver or Liability?

    Across the world, governments and health authorities are working together to fight the COVID-19...

    How to do Security Awareness Training for Remote Employees

    Waging culture change is not an easy task. Trying to do that remotely feels near-impossible. But...

    Prev 3 4 5 6 7 Next