Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Your cyber security goals are worthless. There, we said it
Here’s the thing. Your cybersecurity goals are very noble. You know the risks you want to avoid, and that’s great. Except it could all count for nothing. If you’re a security awareness professional, don’t quit your job just yet. We want to get you on your way to...
On demand webinar: Using SebDB to reduce key business risks
ON DEMAND WEBINAR How to use SebDB to reduce your human risk A conversation with Dr. Jason NurseHow many security behaviors are you targeting? And which risks have you linked them to? Most security professionals set broad goals like “reduce malware infections”. But...
Why are your people still snoozing updates?
Enabling auto-updates is more complicated than you think Last week, our CEO recommended a few ways to influence long-term security behaviors. This week, we’re jumping into auto-updates.“Change is the only constant.” That’s certainly true as far as IT is concerned....
10 ways to influence long-term security behaviors
Just because your security awareness training is ‘engaging’ doesn’t mean it works Creative, funny, and wildly engaging security awareness training doesn’t lead to lasting behavior change. What it does is make people say, “I really enjoyed your training and...
Behave 1.0
Security awareness doesn’t translate to behavior change. But measuring and influencing security behaviors does. And that’s the focus of CybSafe’s Behave Series.
A lesson on security behaviors
It’s time you learnt your lesson about security behaviors Assign all the traditional security awareness training you want. Your people will probably attend every session and tick all the right boxes, but their security behaviors won’t change. But that doesn’t mean...
On demand webinar: Influencing specific security behaviors: Real-world examples
FREE WEBINAR Influencing specific security behaviors: Real-world examples How the CybSafe platform can help you influence (and change) specific security behaviorsHow long have you been relying on traditional security awareness training to lower your human risk?...
It’s time to stop exposing yourself online
In last week’s Behave Series blog, we explored phishing simulations, and how to put them to work in your organization.This week, we’re staging an intervention. Because you've just got to stop revealing so much of yourself to Internet strangers. Oh, and, we’re talking...
A new approach to simulated phishing
A new approach to simulated phishingHow to run simulated phishing campaigns (the right way) and reduce your human cyber riskAnyone can be phished. Anyone. All it takes is the right email, sent at the right time, in the right situation. Yeah, that’s a lot of ‘rights’...
Goodbye, security awareness training!
It’s time to pull the plug on traditional security awareness training We know it’s hard to let go. But this is getting out of hand. Traditional security awareness training has been on its deathbed for so long now that our eyes water whenever we get a whiff of...
How to get phishing simulations right
As part of our Behave Series last week, we talked about multi-factor authentication (MFA), and how to encourage your people to adopt it.This week, we’re diving into phishing simulations. They’re particularly useful for finding and filling the security cracks in your...
On demand webinar: Security awareness is dead (or dying)
FREE WEBINAR Security awareness is dead (or dying) Reducing human cyber risk in your organizationOn demandSecurity awareness is dead. Or, at the very least, is dying. Think about it. You have a modern business. Or maybe you’re just trying to keep up with the...
Spotlight: Have you got the multi-factor?
Last week in our Behave Series blog we looked at passwords. This week we’re turning it up to 11. This week, we’re talking about multi-factor authentication (MFA). Multi-factor authentication. It’s the unsung hero of cybersecurity. It’s thwarted many a cybercriminal....
Spotlight: Creating a passphrase ruleset
This week we’re focusing on passwords. We know you’re no stranger to these, and neither are your workforce. But familiarity isn’t helpful here. In fact, it’s a criminal’s best friend. Everyone in your business will have at least three or four passwords in their...
Phishing webinar hot take: Insurance executives need to get it together
Look, anyone can be phished. Yes, even the executives in their fancy suits. But that’s not what we’re here to talk about. We’re here to talk about some of the reasons why phishing risk isn’t being properly managed. And yes, that means we’re calling out the higher ups...
India, Canada Lead International Privacy Laws To Watch
Law360
Financial service workers are putting in longer hours since the start of the pandemic, leading them to worry about making mistakes
Canary Wharf, London, 10 August 2022 - More than half (51 per cent) of financial services workers say they are working longer hours with the introduction of working from home and hybrid working practices. This has led 22 per cent to state they feel there is a...
Legal webinar recap: 3 hard truths we learned about lawyers
For most law firms, ransomware is just another cyber threat. And, as we all know when it comes to all cyber threats, an anti-virus, firewall, traditional SA&T, and a positive “it won’t happen to us” attitude are enough to ward them off, right? Wrong. Very,...
How to make money with law firms and ransomware
Law firms + ransomware = profit For cyber criminals. Are you a cyber criminal? No? Well, you might want to stick around anyway, especially if you work for a law firm. Why? Because we’re breaking down three steps every career criminal can take to get (malware)...
Ebook: Ransomware is real
Ransomware is real So make sure you never have to deal with it againRansomware is on the rise. But you already know that. Because it’s constantly in the news. While it’s easy to buy into the fearmongering, the truth is that the threat is manageable … with your...
On demand webinar: How to attack law firms using ransomware
FREE WEBINAR How to attack law firms using ransomware. And how to teach people to spot the signs.Client data is big business. And the legal sector is a gold mine. So much sensitive data. So little security. Yeah, most firms have technological security measures...