Select Page

Rewind

All the content from last year’s PeepSec, Impact and flagship industry events

 

A new approach to simulated phishing

A new approach to simulated phishing

A new approach to simulated phishingHow to run simulated phishing campaigns (the right way) and reduce your human cyber riskAnyone can be phished. Anyone. All it takes is the right email, sent at the right time, in the right situation. Yeah, that’s a lot of ‘rights’...

read more
Goodbye, security awareness training!

Goodbye, security awareness training!

It’s time to pull the plug on traditional security awareness training   We know it’s hard to let go. But this is getting out of hand. Traditional security awareness training has been on its deathbed for so long now that our eyes water whenever we get a whiff of...

read more
How to get phishing simulations right

How to get phishing simulations right

As part of our Behave Series last week, we talked about multi-factor authentication (MFA), and how to encourage your people to adopt it.This week, we’re diving into phishing simulations. They’re particularly useful for finding and filling the security cracks in your...

read more
Spotlight: Have you got the multi-factor?

Spotlight: Have you got the multi-factor?

Last week in our Behave Series blog we looked at passwords. This week we’re turning it up to 11. This week, we’re talking about multi-factor authentication (MFA). Multi-factor authentication. It’s the unsung hero of cybersecurity. It’s thwarted many a cybercriminal....

read more
Spotlight: Creating a passphrase ruleset

Spotlight: Creating a passphrase ruleset

This week we’re focusing on passwords. We know you’re no stranger to these, and neither are your workforce. But familiarity isn’t helpful here. In fact, it’s a criminal’s best friend.  Everyone in your business will have at least three or four passwords in their...

read more
How to make money with law firms and ransomware

How to make money with law firms and ransomware

Law firms + ransomware = profit For cyber criminals.   Are you a cyber criminal? No? Well, you might want to stick around anyway, especially if you work for a law firm. Why? Because we’re breaking down three steps every career criminal can take to get (malware)...

read more
Ebook: Ransomware is real

Ebook: Ransomware is real

Ransomware is real So make sure you never have to deal with it againRansomware is on the rise. But you already know that. Because it’s constantly in the news. While it’s easy to buy into the fearmongering, the truth is that the threat is manageable … with your...

read more
Triple-pronged Threat: The Cyber Security Challenge

Triple-pronged Threat: The Cyber Security Challenge

Financial services have quickly evolved in recent years. They’ve had to. With more people remote working, they’re accessing systems from a greater number of touchpoints. They’re working unusual hours. Yet, in a period of accelerated change not everything has kept up...

read more
Long read: How to measure behaviour

Long read: How to measure behaviour

LONG READ How to Measure Security Behavior Introduction Technology isn’t enough to protect your business from modern cyber threats. Cybercriminals exploit the human element at every opportunity. Making people more secure is core to any meaningful cyber security...

read more