Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

12 Steps to a Security Ignorance Program

Most people working for organisations have been exposed at some point in their careers to security awareness programs. Some of these programs are well-executed and delivered, while others ...

Video Verification and Deepfakes

Technology has introduced greater convenience for consumers around the world. With each new technological advancement, we have benefited from better, faster, and more accurate ...

Running Headfirst Into a Breach

The pandemic changed the fortunes of many organisations. Perhaps none so much as Zoom, which has found itself becoming a noun synonymous with any form of video call.

5 Tips For Consolidating Remote Work Tech Debt

In 2020, nearly every organisation embraced remote working to some extent or another. For some, the transition was smooth and easy, as they already had a mobile workforce and were largely ...

Embarrassment is Better Than Regret - Report Suspected Phishing Emails

There are many great things I can say about my time at KnowBe4. Colleagues are fun, approachable, witty, and have a phrase for most eventualities. The phrase that goes around in my mind ...

Computer Security Day

November 30th is Computer Security Day; a day to remind us all to protect our computers… But what does protecting your computer actually mean?

Cyber Security Awareness Month is Over... Now What?

October was Cyber Security Awareness Month, the month during which many organisations and individuals contributed their ideas, shared content and helped educate each other on the ...

Manipulation by Disinformation: How Elections are Swayed

Security Serious Week 2020 focused on disinformation, and there were many talks, tweetchats, presentations, panel discussions, and blogs.

Cybersecurity Awareness Month Lessons Learned: Out of Bounds Communication

When staying safe online, it’s important not to go “out of bounds” for communication. Simply put, going out of bounds could mean a recipe for how your users could fall victim to a ...

The Ultimate Cyber Security Tip

It’s Cyber Security Awareness Month, and the security advice is flowing out from all corners of the web to advise your users on remaining secure. However, all this information can be ...

5 Cyber Security Awareness Month Tips for Cybersecurity Professionals

It’s Cyber Security Awareness Month which is a great time of year for everyone to dispense security wisdom like Oprah giving away cars.

The Seven Dimensions of Security Culture: Attitudes

KnowBe4’s Security Culture Report is the result of data collected from 120,000 global employees in the following industries: Banking, Financial Services, Insurance, Consulting, Business ...

Are Account Takeovers Driving Towards a Passwordless Future?

The bad guys will try to take over accounts all the time. Logging onto someone's account with their credentials is usually a whole lot easier than trying to compromise the website ...

The Face of APT Actors

If I were to ask you to picture in your mind a shady criminal organisation consisting of cyber mercenaries, ones that took money from clients, asked no questions, and over the period of ...

How Low Will Cybercriminals Go?

Surely Bond villains only exist in movies -- I mean people aren’t truly evil are they? Especially ones who sit behind a computer. This was part of a discussion I was having with my ...

We're All Third-Party Management Organizations

In 2014, Jeff Immelt, CEO of GE famously said, “if you went to bed last night as an industrial company, you’re going to wake up today as a software and analytics company.”

Removing Zoom Meeting ID's: Treating the Symptom, Not the Cause

Zoom has been under a lot of scrutiny lately, and it's commendable that the vendor has been working through as many security issues as it has. With great growth and visibility comes great ...

Seven Tips to Optimize Security

Data breaches continue, phishing attacks are on the rise, and people responsible for security wake up in a cold sweat a few times a year worried they’re the next victims.

An Uber Phish

London's Transport for London (TfL) is the entity that manages public transportation and public carriage licenses. In November 2019, TfL stated it would not renew Uber’s Private Hire ...

The Paradox of Perfection

One of the challenges with living in a hyper-connected world is that it’s easy for anyone to stand on a soapbox and point out when something is wrong.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.