Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Chief Executive Officer & President

Stu Sjouwerman (pronounced “shower-man”) is the founder and CEO of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

KnowBe4 Applauds Proposed Legislation for Cybersecurity Training Requirement for U.S. House Members

On May 10, 2019, U.S. Representative Kathleen Rice (D-NY) introduced legislation that will require House Members to partake in annual cybersecurity training. At this time, elected ...
Continue Reading

[On-Demand Webinar] How to Prevent 81% of Phishing Attacks With DMARC

Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your ...
Continue Reading

Blank Emails Come Before BEC Fraud Attack

Business email compromise (or CEO fraud) has its reconnaissance phase, too. Researchers at Agari say they’ve found that blank, unsolicited emails are often an early sign that a BEC gang ...
Continue Reading

The Wall Street Journal Just Published An Interview with Kevin Mitnick, KnowBe4's Chief Hacking Officer

August 16, 2019 - Randy Maniloff wrote about Kevin in the WSJ "Weekend Interview". It's a great article that covers his start as a teenage hacker, how he wound up in jail, and how he ...
Continue Reading

Are Local Government and Municipalities Part of a Coordinated Attack on the U.S.?

There are too many ransomware attacks to ignore the similarities. It’s either government networks are easy prey, or someone is trying to cash out on the U.S., one attack at a time.
Continue Reading

Social Engineering Testing is Necessary to Fend off Phishing Attacks

The success of social engineering as part of phishing and spear phishing attacks has caused organizations to realize they need an effective tactic to make employees vigilant.
Continue Reading

The Unusual Activity Would be the Warning Itself

BleepingComputer has come across a phishing campaign that’s spoofing “Unusual sign-in” warnings from Microsoft to steal users’ credentials. The emails look nearly identical to Microsoft’s ...
Continue Reading

Even when your users don't click...

...they can still be helping the bad guys compromise your organization. Sad but true.
Continue Reading

Report: Data Breach in Biometric Security Platform Affecting Millions of Users

Led by internet privacy researchers Noam Rotem and Ran Locar, vpnMentor’s team recently discovered a huge data breach in biometrics security platform BioStar 2. Once stolen, fingerprint ...
Continue Reading

BYOD Really Means Bring Your Own Risk

A new survey by Nationwide Insurance found that while 83 percent of small businesses let their employees work from home when necessary, one-fifth of these companies don’t provide ...
Continue Reading

Still Dodging that Sextortion Bullet

It has long been true that sextortionists really had nothing on their intended victims. No video, no screen captures, nothing at all beyond shame and an uneasy conscience. Unfortunately ...
Continue Reading

Security warning for software developers: You are now prime targets for phishing attacks

Danny Palmer at ZDNet wrote: "Software developers are the people most targeted by hackers conducting cyberattacks against the technology industry, with the hackers taking advantage of the ...
Continue Reading

Scam Of The Week: See Jeffrey Epstein Last Words On Video

This weekend, news broke that Jeffrey Epstein was found dead in his cell, apparently a suicide. This is a celebrity death that the bad guys are going to be exploiting in a variety of ways ...
Continue Reading

3 Important Facts to Take Away From the New Data Security Law

By Lecio De Paula, Jr., Director of Data Privacy, KnowBe4. New Hampshire joins Ohio, South Carolina, and Michigan in enacting a new data security law directed at insurers modeled after ...
Continue Reading

Three Lessons from a Recent MegaCortex Ransomware Phishing Attack

The MegaCortex strain of ransomware has been used in criminal campaigns targeting businesses as opposed to private individuals. The QuickBooks cloud-hosting firm iNSYNQ, has sustained ...
Continue Reading

Varieties of Extortion Experience

We are all familiar with ransomware and its increasingly dangerous cousin, wiper malware. The first encrypts your files and demands ransom payments in exchange for the decryption key. The ...
Continue Reading

Here Are Some Interesting Headlines I Found During Black Hat

Black Hat 2019 - The Craziest, Most Terrifying Things We Saw: I ran into Neil Rubenking when I went to the Qualys party which was in the Foundation Room all the way on top of the ...
Continue Reading

Business Email Compromise Doubles in Incidents and Triples in Cost

The latest data from the U.S. government’s Financial Crimes Enforcement Network (FinCEN) shows fraud via business email is changing tactics and becoming more effective.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews