Phishing Simulation Plaform
5 Reasons Phishing Simulations Tests Fail
We’ve been running successful phishing simulations for years now, developing proven steps toward employee engagement and behavioral change. Over the course of time, we’ve seen customers come to us, bruised by phishing ...
Hi-5 With A CISO Andrea Szeiler, Transcom
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Andrea Szeiler has been working in the cybersecurity space for over a decade. She held Audit and ...
Hi-5 With A CISO Rene Leimegger, Alpega Group
Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Rene Leimegger has been working in the cybersecurity space for over 10 years. He held Service Management and ...
5 Reasons Why Text-based Training Beats Video Training Any Day (VIDEO)
There’s a rumor going around that people learn better or engage better with video content over text-based content. It’s easy to see where the misconception came from. After all, the average time ...
Hi-5 With A CISO Ian Parker, Menzies Distribution
Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Ian Parker has been working in the cybersecurity space for over 20 years. He held security information management ...
Is Spear Phishing Employees an Effective Training Technique? (VIDEO)
There is a common mistake in security awareness training, where teams spend time creating complex and sophisticated phishing simulations that are meant to mimic spear-phishing attacks or business email compromise threats against ...
Is Spear Phishing Employees an Effective Training Technique? (VIDEO)
There is a common mistake in security awareness training, where teams spend time creating complex and sophisticated phishing simulations that are meant to mimic spear-phishing attacks or business email compromise threats against ...
How to Mitigate the High-risk Employee Group Effectively? (VIDEO)
Let’s try to visualize a high-risk employee. What do you see? We all know some employees are considered more high-risk than others. These are the ones who fall for cyber-attacks more often ...
How to Mitigate the High-risk Employee Group Effectively? (VIDEO)
Let’s try to visualize a high-risk employee. What do you see? We all know some employees are considered more high-risk than others. These are the ones who fall for cyber-attacks more often ...
How should I report Progress of my Security Awareness Training to the C-suite? (VIDEO)
We’ve talked before about measuring progress rather than sheer participation to prove the worth of your security awareness training. Here’s how to prepare yourself for a meeting with the C-suite, including the ...