Don’t Respond to Suspicious Emails

Don’t Respond to Suspicious Emails

Sometimes when sending phishing simulations to our clients, we setup a reply-to address to see if people will reply to suspicious emails and many do ...
More Bees with Honey? Reinforcement vs. Punishment in a Security Training Program

More Bees with Honey? Reinforcement vs. Punishment in a Security Training Program

Ambassadors of security training programs often struggle with the most effective way to drive success. The ultimate purpose of these programs is to change employee behavior and create a more secure organization ...
Beware of Account Takeover

Beware of Account Takeover

One way to verify if an email is legitimate is to look at the sender’s address, the actual sender’s address, not just the sender’s name. One tactic cyber criminals employ is using ...
Grease the Skids: Improve Training Successes by Optimizing the Environment

Grease the Skids: Improve Training Successes by Optimizing the Environment

You have carefully selected a training program. Employees are completing the courses. And yet, they are not reporting suspicious emails and their passwords are made up of favorite sports teams and graduation ...
Training Not Sinking In? Try a Programmatic Approach

Training Not Sinking In? Try a Programmatic Approach

In honor of National Cybersecurity Awareness Month (CSAM), Dane Boyd, PhishLabs’ Security Training Manager, and I will share a series of posts covering topics from cybersecurity to organizational learning and development. We ...
Phishing Simulations: Should they Reflect Real-World Attacks?

Phishing Simulations: Should they Reflect Real-World Attacks?

As the manager of a security awareness team, whose primary goal is to educate users on how to spot phishing attacks, I often get asked, “can you make the phishing simulations look ...
personality traits

Personality Traits: Key to More Effective Security Training?

Organizations that understand their employees’ personality types could better shape their security awareness training, research shows We know that employees are one of the biggest threats—whether accidentally or through malicious intent—to network ...
Security Boulevard
Low Appetite for Long Security Training? Use a Bite Sized Approach

Low Appetite for Long Security Training? Use a Bite Sized Approach

Although computer-based training has been on the scene for over two decades, it is only recently that learning professionals have begun to optimize it. Often these courses present hours of content in ...
It Only Takes One to Detect or Infect

It Only Takes One to Detect or Infect

It’s time to take action against phish! Phishing attacks are no longer few and far between, they are the norm. Regardless of your company’s investments in filtering technologies and countermeasures, suspicious and ...
How to Cut Healthcare Cyber Incidents by 80 Percent

How to Cut Healthcare Cyber Incidents by 80 Percent

Healthcare data breaches are among the most costly of any industry, and phishing attacks are the number one cause. Security technologies, while essential, are not enough to mitigate the threat posed by ...
Loading...