Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

Posts about

TRENDING THREATS

 

How To Measure Cybersecurity Behavior and Drive Long-Lasting Cultural Change

Chief information security officers everywhere work to instill a culture of security awareness in...

Read More

CIB_phishing-1

    5 Questions to Decide if Your Phishing Simulation Training Is Ethically Sound

    Many companies conduct phishing simulations to test employee’s readiness for email-based social...

    The Power of Integrating Microlearning Into Your Cybersecurity Training Program

    Having trouble getting your employees interested in your cybersecurity awareness training? A lack...

    The "New-School" Approach to Security Awareness Training

    Unless you’re talking about homemade apple pie or Don Draper’s favorite cocktail, “old-fashioned”...

    How To Incentivize Cybersecurity Awareness Training Within Budget

    Security Awareness Program Owners everywhere know it can be hard to get teams excited about...

    Smishing & How to Protect Your Smartphone

    We’ve talked about phishing… ya know, when you receive an email that tricks you into giving away...

    8 Ways to Secure Point of Sale (PoS)

    Point of Sale (PoS) Systems & How to Protect Them Cash is no longer king! Today we’re talking about...

    How to Spot the Biggest Phish in the Sea

    When it comes to fishing, it’s usually the bigger the better. The same is true in the cyberworld:...

    6 Tell-Tale Signs of Targeted Phishing

    What do you get when you blend phishing and targeted social engineering? A highly effective...

    An Inside Job: Threats Among Us

    According to the 2019 Verizon Data Breach Investigation Report a third of all data breaches within...

    Prev 1 2 3 Next