Defining and Managing Success for Security Teams

Defining and Managing Success for Security Teams

Big or small, global or local, almost every organization uses some form of technology, and therefore has security needs within it. Due to the nature of the work and variables in play, metrics and success are often a subjective matter from organization to organization ... Read More
So You Got a SaaS Security Awareness Training Platform, Now What?

So You Got a SaaS Security Awareness Training Platform, Now What?

After months of talks, budget approvals, and getting stakeholder buy in, you finally have the security awareness tool of your choice ready to be used. You get some welcome emails, an onboarding conversation with a customer account manager, and then…..? ... Read More
Phishing and Social Media, Will it Over Take Email?

Phishing and Social Media, Will it Over Take Email?

Each year in our Phishing Trends and Intelligence (PTI) report our team highlights the continued growth and impact email-based phishing attacks continue to have on brands and people around the globe. In following these trends, email-based attacks are still steadily growing in numbers; however, this begs the question of what ... Read More
How To Write Social Media Policies Designed to Reduce Digital Risks

How To Write Social Media Policies Designed to Reduce Digital Risks

Most organizations already have policies and procedures in place to encourage your employees to act in a professional manner while at work. But in our modern connected age, social media makes it easier than ever for anyone tied to your brand to be a vocal representation of who you are ... Read More
Beyond Digital: How Social Media Can Lead to Physical Threats Towards Brands

Beyond Digital: How Social Media Can Lead to Physical Threats Towards Brands

It’s like something straight out of a bad action film: someone slips information on Twitter stating that they are planning a bank robbery or threaten an organization with a bomb ... Read More
Understanding Why Spear Phish Are Highly Effective

Understanding Why Spear Phish Are Highly Effective

| | spear-phishing
In the Oscar-winning movie The Sting, Harry Gondorff (played by Paul Newman) explains to his apprentice Johnny Hooker (Robert Redford) that the con that they set up must be so convincing that their mark, Doyle Lonnegan (Robert Shaw) won’t even realize that he’s been taken ... Read More
How To Tackle the Hidden Threat of Social Media

How To Tackle the Hidden Threat of Social Media

As a marketer I am all too familiar with how social media can benefit or damage a brand ... Read More
Practice Makes Permanent: Avoiding The Training Forgetting Curve

Practice Makes Permanent: Avoiding The Training Forgetting Curve

Despite decades of research about how adults learn, many organizations continue to follow an antiquated model of training design that is counterproductive to their goals ... Read More
Is it a Phish? June 22 Edition

Is it a Phish? June 22 Edition

|
After a brief hiatus we’re back, and this time we’re bringing out the big guns with one of our enterprise account managers. This week we are putting Ryan Clemency to the test of getting us back to a perfect score, so that one day we may finally hit a perfect ... Read More
Loading...