Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

Posts about

TRENDING THREATS

Takeaways From the Biggest Cyber Attacks of 2021

Cyber attacks have been on the rise year after year, and 2021 has been no exception. Cybersecurity...

How To Train and Protect Your Employees From Future Phishing Attacks

Phishing is the second costliest attack vector when it comes to breaches, according to the IBM 2021...

The Future of Cybersecurity in 2022 and Beyond

As any security professional is all too aware, cybersecurity is continuously evolving in light of...

Why Cybersecurity Awareness Training Needs To Be a Company-Wide Priority

While CISOs and security awareness program owners recognize how critical cybersecurity awareness...

7 Ways To Maintain Security While Employees Are Working Remotely

Since early 2020, many organizations have been leaving the office to work from home, creating a...

The Latest From Breaking Security Awareness Webinar Series

With remote work providing new access points for threat actors, cybersecurity is at the forefront...

What Is Multi-Factor Authentication (MFA) and Why Should You Implement It?

Multi-factor authentication (MFA) is a cybersecurity best practice, yet many organizations and...

Carrot or Stick: How Do You Get Your Users To Take Cybersecurity Seriously?

Cybersecurity is serious business; companies that ignore it do so at their own risk. And that risk...

How To Derive Cyber Threat Intelligence From the Inside

Some organizations assume that cybersecurity is exclusively an external game. Thr actors attack...

What Is the Living Security Community & How Can It Help Cybersecurity Awareness Professionals?

Cybersecurity awareness training professionals, like Chief Information Security Officers (CISOs)...

How To Measure Cybersecurity Behavior and Drive Long-Lasting Cultural Change

Chief information security officers everywhere work to instill a culture of security awareness in...

5 Questions to Decide if Your Phishing Simulation Training Is Ethically Sound

Many companies conduct phishing simulations to test employee’s readiness for email-based social...