Select Page
You and whose army? You can’t outsmart ransomware attacks alone

You and whose army? You can’t outsmart ransomware attacks alone

Ransomware’s the gift that keeps on giving (headaches), but here’s a remedy Ransomware is a real pain. No sane cybersecurity professional would say otherwise. But most people—yes, even plenty of cyber professionals—struggle to take into account the impact it can have...
Train smart, not hard! The intelligent approach to phishing training

Train smart, not hard! The intelligent approach to phishing training

Hack a punch: Why intelligent phishing simulation is vital in the fight against scammers Your friend Andy’s always been interested in kickboxing. So he joins a beginner’s class where he rehearses all the moves and works on his fitness. Bit by bit, he perfects his form...
5 big factors in a strong cybersecurity culture

5 big factors in a strong cybersecurity culture

What you need to know about assessing your cybersecurity culture Security culture. It’s not a new concept. The phrase has been thrown around for years and years.  But in that concept lies a few challenges. Like defining its shape, parameters, where it starts, and...