People have been using stories to pass on information for over 4,000 years. Integrating stories into security...
PHISH
The top cybersecurity attitudes and behaviors you need to know about
Houston, we have a problem. For too long, we’ve neglected the most integral element of cyber security… people.
There’s been a lack of understanding about how personal habits affect cyber security. Whether you have a tendency to procrastinate, take risks or always follow the rules, your individual habits and views matter!
Ransomware attack on the Irish Health Service Executive
Last week, the Irish Health Service Executive (HSE) suffered a cyber attack which forced a temporary shutdown of its...
The 4 key factors for a successful phishing simulation
Phishing attacks are a problem. Over the past year, 88% of professionals reported an increase in phishing attacks. It...
What the government must do to tackle cyber crime
Technology will be vital. As will collaboration between the public and private sectors. But to truly beat cyber crime, we’re going to need to check every single box…
Let’s punish phishing victims… er, you want to do what?!
There is a big, hairy elephant in the room when it comes to phishing: Many organisations believe that it’s okay, or...
How to identify a phishing email
You’ve received an email. As no phishing filter can keep out 100% of all phishing attacks, there’s a chance the email...
The top 18 questions we get asked about CybSafe
CybSafe’s many technological innovations often intrigue audiences during demonstrations – and elicit questions that aren’t necessarily run-of-the-mill.
Calculating your true phishing vulnerability
Have you ever wondered whether your reduced phishing susceptibility rate is really telling the full story? Or wondered why it may be low one week but spike the next?