Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Founder and Executive Chairman

Stu Sjouwerman (pronounced “shower-man”) is the Founder and Executive Chairman of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

BYOD: 'the inmates of the asylum have control'

IT pros surveyed by Network World and SolarWinds shared a range of tactics for handling the mobile device management challenge. Mobile devices are multiplying and -- sanctioned or ...

Spoiler alert: Your TV will be hacked

Last week you may have read a headline that blared "100 million TVs will be Web-connected by 2016." Regular readers of this blog know I'm always on the lookout for new threats, so the ...

Pinpoint Unsavory Elements In Your Neighborhood

The Criminal Tracker app by U.S. Publications Inc says that a study by the U.S. Department of Justice has revealed that sex offenders are four times more likely to re-offend than other ...

CyberheistNews vol 2, #17

Antivirus is 30 years old

[caption id="" align="alignleft" width="260" caption="Vaccine"][/caption] Simon Edwards created a great blog post about this April 12, 2012. He started out with: " Once upon a time, ...

Blast from the Antivirus Past

[caption id="" align="alignleft" width="250" caption="MS DOS 6.0"][/caption] Remember MS-DOS Version 6? It was released March 1993. The new 6.0 had a lot of new stuff including a basic ...

Video: How a crimepack works

Cybercriminals are as organized and industrious as any legitimate business. Case in point: exploit kits, also known as crimepacks, which bad guys can purchase and which make infecting ...

SMS-controlled Malware Hijacks Android Phones

Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered new Android malware that is controlled via SMS that can do a number of things ...

99 Percent Of Malicious Action Starts On Workstations

Roger Grimes made this remark on InfoWorld when he commented on the 2012 Verizon Data Breach Investigations Report that was released last week. What he said was: "You should enable event ...

AV Vendor claims 600,000 Infected Macs in Botnet

The CSO website reported: "A Mac trojan horse spotted by security analysts since last year has infected more than 600,000 Apple computers, says Dr. Web, a Russian antivirus vendor. Apple ...

Remove Hidden Data And Personal Information By Inspecting Documents

This is a good hint for your users from the Microsoft website: "If you plan to share an electronic copy of a Microsoft Word document with clients or colleagues, it is a good idea to ...

If You Do The Cyber Crime, Expect To Do The Time

Roger Grimes at InfoWorld observes something encouraging..."Every public speaker and writer likes a good catchphrase or refrain that will grab the audience's attention. One of mine: ...

CyberheistNews Vol 2, #15

Finally Defined: 'Advanced Persistent Threat'

[caption id="" align="alignleft" width="650" caption="Advanced Persistent Threat"][/caption]

Global Payment Hack: Almost 340 Million Drop in Value

[caption id="" align="alignleft" width="290" caption="Global Payment Hacked"][/caption] This is what they said in their press release: “Global Payments Inc. (NYSE: GPN), a leader in ...

New Strategies to Fight Phishing

[caption id="" align="alignleft" width="175" caption="Fighting Phishing"][/caption] BankInfo Security summarized the phishing problem for the Financial Industry, and quotes the security ...

Users are the weakest link in IT

Some excellent work by our colleagues at Trend Micro. They see that users are the weakest link in IT! [caption id="" align="alignleft" width="550" caption="Weakest Link in IT"][/caption]

Malicious Office documents target Mac OS X

Trendmicro reported: "We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue. One of these messages is about the ...

Unique Malware Samples 2006-2011

[caption id="" align="alignleft" width="361" caption="Malware Unique Samples"][/caption] Malware is still exploding. Check out this graph. During the last few years, the security industry ...

Video on Zeus Botnet Takedown

You have probably heard about how Microsoft, the US Marshals together with some other organizations killed some some Zeus botnets. Microsoft's PR crew released a video about the operation ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.