Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

Posts about

TRENDING THREATS

 

Smishing & How to Protect Your Smartphone

We’ve talked about phishing… ya know, when you receive an email that tricks you into giving away...

Read More

CIB_phishing-1

    8 Ways to Secure Point of Sale (PoS)

    Point of Sale (PoS) Systems & How to Protect Them Cash is no longer king! Today we’re talking about...

    How to Spot the Biggest Phish in the Sea

    When it comes to fishing, it’s usually the bigger the better. The same is true in the cyberworld:...

    6 Tell-Tale Signs of Targeted Phishing

    What do you get when you blend phishing and targeted social engineering? A highly effective...

    An Inside Job: Threats Among Us

    According to the 2019 Verizon Data Breach Investigation Report a third of all data breaches within...

    The Internet of (Unsecure) Things

    Imagine arriving home after a tricky day at work: the lights in your living room are automatically...

    Five Types of Themed-Phishing Scams and How to Avoid Them

    Curious about what’s new in the phishing world? Eager to know what bait cyber criminals are using...

    Think You Can't Get Phished?! Here are Examples of COVID-themed Phishing that Might Change Your Mind

    Have you recently received an email or text urging you to make an unexpected payment or buy...

    Social Engineering and Re-Opening Society

    Imagine you receive a message on Facebook from a good friend you haven’t seen for some time but...

    Zoom-Bombing: How Secure is Your Remote Meeting?

    Have you ever considered holding an important business meeting in the middle of a crowded park...

    Prev 1 2 Next