Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

Posts about

phishing

How To Train and Protect Your Employees From Future Phishing Attacks

Phishing is the second costliest attack vector when it comes to breaches, according to the IBM 2021...

Living Security Community's Blog Contest Winner: Are You Waving the Wrong Red Flag?

The Living Security Community is excited to announce Peter Kirwan as the winner of our recent blog...

How To Measure Cybersecurity Behavior and Drive Long-Lasting Cultural Change

Chief information security officers everywhere work to instill a culture of security awareness in...

5 Questions to Decide if Your Phishing Simulation Training Is Ethically Sound

Many companies conduct phishing simulations to test employee’s readiness for email-based social...

The "New-School" Approach to Security Awareness Training

Unless you’re talking about homemade apple pie or Don Draper’s favorite cocktail, “old-fashioned”...

How To Incentivize Cybersecurity Awareness Training Within Budget

Security Awareness Program Owners everywhere know it can be hard to get teams excited about...

Today, Living Security’s Cybersecurity Defense Was Tested. It Passed.

At Living Security, we spend our days developing better and more effective methods of how to train...

5 Must-Watch Cybersecurity Webinars for Security Awareness Program Owners

Webinars are a terrific resource for learning about the newest evolutions in cybersecurity. But...

5 Tips for Proving the ROI of Your Security Awareness Training

“What’s the ROI?” they demand, every time you ask for more support for your cybersecurity awareness...

6 Metrics to Track in Your Cybersecurity Awareness Training Campaign

Security Awareness Program Owners know that proving ROI to the big wigs is no easy feat. While you...

Phishing: Staying off the Hook

That is not a typo, nor is it a high society twist on regular fishing. Phishing is by far the #1...