Understanding Why Spear Phish Are Highly Effective

Understanding Why Spear Phish Are Highly Effective

| | spear-phishing
In the Oscar-winning movie The Sting, Harry Gondorff (played by Paul Newman) explains to his apprentice Johnny Hooker (Robert Redford) that the con that they set up must be so convincing that their mark, Doyle Lonnegan (Robert Shaw) won’t even realize that he’s been taken ... Read More
How To Tackle the Hidden Threat of Social Media

How To Tackle the Hidden Threat of Social Media

As a marketer I am all too familiar with how social media can benefit or damage a brand ... Read More
Practice Makes Permanent: Avoiding The Training Forgetting Curve

Practice Makes Permanent: Avoiding The Training Forgetting Curve

Despite decades of research about how adults learn, many organizations continue to follow an antiquated model of training design that is counterproductive to their goals ... Read More
Is it a Phish? June 22 Edition

Is it a Phish? June 22 Edition

|
After a brief hiatus we’re back, and this time we’re bringing out the big guns with one of our enterprise account managers. This week we are putting Ryan Clemency to the test of getting us back to a perfect score, so that one day we may finally hit a perfect ... Read More
Is it a Phish? Office 365 Edition

Is it a Phish? Office 365 Edition

| | Is it a phish?
Email service providers have been and continue to be amongst some of the most targeted industries when it comes to phishing. In fact, in 2017 email and online services combined overtook the financial industry as the largest phishing targets with its share has grown more than a quarter since 2016 ... Read More
FBI’s IC3 Report Reconfirms Impact of Phishing on Consumers

FBI’s IC3 Report Reconfirms Impact of Phishing on Consumers

|
It may be one of the oldest types of digital attacks, but according to the FBI’s IC3 report phishing remains a top vector ... Read More
Edward Snowden on Passwords: Last Week Tonight with John Oliver (HBO)

How To Change Security Behaviors: Identity Management

Account compromise is a big deal. Especially when it’s privileged account compromise ... Read More
Is it a Phish? May 25 Edition

Is it a Phish? May 25 Edition

This week we are putting our brand new marketing team member, Rachel, to the task of hopefully getting us to our first perfect streak. And because she’s new to the team we decided to bring back our classic format ... Read More
Mobile Adoption is Setting Security Awareness Training Back

Mobile Adoption is Setting Security Awareness Training Back

Phishing is one of the oldest forms of cyber attacks, but until recent years it was commonly thought of as an entirely desktop attack vector. This was primarily due to the flow of web traffic coming through laptops and desktop computers; however, the overtaking of mobile traffic has also drawn ... Read More
Loading...