Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Founder and Executive Chairman

Stu Sjouwerman (pronounced “shower-man”) is the Founder and Executive Chairman of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

New Ransomware Attack Reboots Systems into Safe Mode to Bypass Antivirus!

The latest strain of Snatch ransomware performs a devious task to ensure tools designed to protect against ransomware are nowhere to be found during encryption.

Social Engineering via Elder Scrolls

Scammers are going after Elder Scrolls Online accounts by posing as the game’s developers and informing players that their accounts will be banned unless they hand over their credentials, ...

Have Your Users Been Exposed in the 8.5 Billion Breached Records This Year?

Data breaches are getting bigger, the bad guys are getting more cunning, and the amount of compromised data is unfortunately continuing to rise. According to RiskBased Security, breach ...

Ransomware at Colorado IT Provider Affects 100+ Dental Offices

A Colorado company that specializes in providing IT services to dental offices suffered a ransomware attack this week that is disrupting operations for more than 100 dentistry practices, ...

Big Bad BEC

A Chinese venture capital firm was scammed out of $1 million in a noteworthy BEC (Business Email Compromise, or CEO fraud) scam, CyberScoop reports. The million dollars was supposed to be ...

Police warn of new 'line-trapping technology' being used to scam people over the phone

TORONTO -- A new piece of sophisticated technology is being used by fraudsters to scam unsuspecting people over the phone. Police said a woman in York Region received a call earlier this ...

KnowBe4 Content Updates and New Resources - November 2019

We've got a few important updates to share with you for the month of November!

63% of Workers Reuse Passwords For Multiple Work Devices and Applications

According to Enterprise Strategy Group, 63% of workers have reported using the same password for multiple work devices and/or applications. This just one statistic from ESG's upcoming ...

Feds Charge Russians In Massive $100 Million Bank Phishing Scheme

The U.S. Justice and Treasury departments took action Thursday against a Russian hacking group known as “Evil Corp.,” which stole “at least” $100 million from banks using phishing attacks ...

[Heads Up] Iran Has Launched Evil New Malware That Wipes Your Windows Workstations

Zak Doffman posted: "Iran’s state-sponsored hackers have deployed a new strain of malicious malware, warns IBM, which has been aimed at the “industrial and energy sectors” in the Middle ...

You Have Not Suffered A Data Breach But How Do You Prevent Credential-Stuffing Attacks?

Frequent data breaches and the widespread availability of automated tools to take advantage of the compromised information have greatly increased the efficiency of credential stuffing ...

[On-Demand Webinar] Spotting the Gaps: Is Your Traditional Security Stack Giving You a False Sense of Security?

Endpoint security, firewalls, VPNs, authentication systems… we’ve all got them. But do they really provide the comprehensive level of security your organization needs to keep the bad guys ...

Europol Finds Majority of Attack Groups Rely on Spear Phishing as Primary Infection Vector

A new report from Europol’s European Cybercrime Center (EC3) breaks down how targeted phishing attacks are being done, and how to avoid becoming a victim.

Gift Card Scams are Decreasing in Light of Other Business Email Compromise Scams

New data from email security vendor Agari shows Business Email Compromise (BEC) attacks shifting tactics last quarter, in favor of scams resulting in larger payouts.

Identity Deception-Based Phishing Attacks Show an Increase in Impersonating Individuals

The use of impersonating a person or brand as part of an attack in on the rise, giving attackers the upper hand, establishing instant credibility and lowering the defenses of the ...

Phishing for Gamers Uses A Fake Skin Giveaway

BleepingComputer warns that a fake Steam skin giveaway site is stealing users’ Steam credentials. The site appears to be running a 26-day promotion giving away free skins for ...

5 Harsh Truths About Ransomware Attacks At LAW.COM

Frank Ready at LAW.COM wrote this very clear article with great budget ammo. I suggest you forward the link at the bottom to your Legal team, with a cc to your C-level executive who own ...

Insecure Database Exposes Millions of Private SMS Messages

Researchers discovered an unprotected TrueDialog database hosted by Microsoft Azure with diverse and business-related data from tens of millions of users.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.