Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Roger Grimes

Roger Grimes
Roger A. Grimes is a Data-Driven Defense Evangelist at KnowBe4. He is a 30-year computer security professional, author of 13 books and over 1,200 national magazine articles. He frequently consults with the world’s largest and smallest companies, and militaries, and he has seen what does and doesn’t work. Grimes was a weekly security columnist for InfoWorld and CSO magazines from 2005 - 2019. He regularly presents at national computer security conferences, and has been interviewed by national magazines and radio shows, including Newsweek magazine and NPR’s All Things Considered. Roger is known for his often contrarian, fact-filled viewpoints.
Find me on:

Recent Posts

How Does Quantum Impact Passwords?

Yeah, quantum computers are likely to be able to crack passwords from every angle.
Continue Reading

Is Your Organization’s Password Complexity Requirement Strong Enough? Probably Not

Is your organization’s password complexity strong enough?
Continue Reading

Password Managers Can Be Hacked Lots of Ways and Yes, You Should Still Use Them

The recent hack (at least 7th) of the LastPass password manager has lots of people wondering if they should use a password manager.
Continue Reading

[Heads Up] Giant LastPass Breach Can Supercharge Spear Phishing Attacks

By Roger A. Grimes. KnowBe4 recommends that everyone use a password manager to create and use strong passwords as a part of their password policy ...
Continue Reading

Ivanti Report Shows Cybersecurity Practitioners Concentrating on Right Threats

A recent Ivanti report shows cybersecurity practitioners getting more focused on the threat landscape, but defenders may need to hone their attention to focus on the right threats. 
Continue Reading

CISA Phishing Infographic Contains a Lot of Good Information

On December 8th, the Cybersecurity & Infrastructure Security Agency (CISA) released a great phishing infographic about data collected, lessons learned and recommendations learned from ...
Continue Reading

[Keep An Eye Out] Beware of New Holiday Gift Card Scams

Every holiday season brings on an increase in gift card scams. Most people love to buy and use gift cards. They are convenient, easy to buy, easy to use, easy to gift, usually allow the ...
Continue Reading

Here Is What You Can Do To Inspect SMS URL Links Before Clicking

Phishing via Short Message Service (SMS) texts, what is known as smishing, is becoming increasingly common (some examples are shown below). There is probably not a person on Earth who ...
Continue Reading

PhishER Turns Golden Hour Into Golden Minute

Hospital emergency rooms around the world are fine-tuned to meet the requirements of the “Golden Hour”. The Golden Hour is a well-accepted medical fact that critically injured or ill ...
Continue Reading

Number Matching Push-Based MFA Is Only Half the Solution

When push-based multifactor authentication (MFA) first came out, I was a big fan. I promoted it as a strong and safe MFA option in my book, Hacking Multifactor Authentication. That was ...
Continue Reading

Passkeys Are Being Pushed in a Big Way

There is a good chance that you and nearly everyone else will be using passkeys in the near future.
Continue Reading

How To Stop Job Scams

I am reading and hearing about a ton of job scams these days. So many, I wondered how anyone could get a real job or employee, especially in these days of often full-time, work-from-home ...
Continue Reading

Could 100% of Phishing Be Eliminated One Day?

Occasionally you will hear people or organizations claiming that they are on the verge of eliminating all social engineering from reaching end-users. Could it be true? Could it happen one ...
Continue Reading

Do Not Use Easily Phishable MFA and That Is Most MFA!

Everyone should use multifactor authentication (MFA), where they can, to protect valuable information. Everyone!
Continue Reading

So, Your MFA is Phishable, What To Do Next

We’ve written a lot about multi-factor authentication (MFA) not being the Holy Grail to prevent phishing attacks, including here:
Continue Reading

Teach Two Things to Decrease Phishing Attack Success

We know everyone is busy. Everyone already has too much on their plate and is trying to learn as much as they can every day.
Continue Reading

More Super Targeted Spear Phishing Ahead

Hardly a day goes by without a news alert about the latest HUGE data breach. It’s so commonplace today that it rarely rates showing at the top of the news. In a newspaper, the ...
Continue Reading

Beware of Sophisticated Malicious USB Keys

Malicious USB keys have always been a problem. There is almost no professional penetration testing team that does not drop a handful of USB keys outside of any targeted organization and ...
Continue Reading

[Eye Opener] Both Job Seekers and Employers Should Be Aware Of New Sophisticated Scams

With record low unemployment, a tight labor market, and increasing customer demand, everyone says it is an employee’s job market out there. But it is getting tougher to get a real job and ...
Continue Reading

Hovering Over Links Will Protect You More Than MFA

Microsoft Security recently released a report which detailed a widely successful phishing attack technique used against over 10,000 of its customers…a phishing attack that worked even if ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews