Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Which Antivirus Has The Best Phishing Protection? Surprise!

I ran across some very interesting research recently done by NSS Labs. They compared twelve of the most popular antivirus engines, they call them endpoint protection products (EPP) and ...
Continue Reading

New CyberSec Executive Order IT Impact Zero

Last Tuesday, the White House issued the long awaited CyberSec Executive Order, which makes an attempt to outline policies that will protect US organizations against cyber-attacks and ...
Continue Reading

Cyber Bullying

KnowBe4 is a market leader in security awareness training for employees in an office environment. However, when we asked people who finished the training what they thought, they said they ...
Continue Reading

CyberheistNews vol 3,

CyberheistNews Vol 3, #7
Continue Reading

Feb SANS Monthly Awareness Video

You may be familiar with our friends at SANS. For their 'Securing The Human' team, every month is security awareness month, same as here at KnowBe4. On the first of every month they post ...
Continue Reading

IT security equals job security

Did you ever expect that our IT networks would be a worldwide battleground for highly sophisticated cyber warfare? IT security certainly will provide job security for the next decade or ...
Continue Reading

CyberheistNews vol 3, #6

Continue Reading

TODAY SPECIAL Kevin Mitnick On Home Shopping Network

Febuary 2, 2013 - Today, Kevin Mitnick is part of Home Shopping Network's TODAY SPECIAL! Kevin partnered with KnowBe4 to create security awareness training for employees in an enterprise ...
Continue Reading

DHS disable your Plug And Play

Today, Jan 29 2013, the Department of Homeland Security advises computer users to disable Universal Plug and Play (UPnP), after researchers at Rapid7 alerted DHS that hackers could ...
Continue Reading

Most Common Motivations Behind DDoS Attacks

Arbor networks Worldwide Infrastructure Security Report (WISR) shows that ideology is the primary attack motivation, followed by online gaming and vandalism. Click on the graphic to go to ...
Continue Reading

CyberheistNews vol3, #05

Continue Reading

Fake Apple Invoices

Internet criminals are getting more and more inventive with their social engineering attacks. Here are two examples of fake Apple invoices. The first is an example from the Sophos blog ...
Continue Reading

CyberheistNews Vol3, #3

Continue Reading

Facebook Scams You Need To Watch Out For

Facebook is loved far and wide by scammers. It's a great pool of an almost unlimited amount of victims, most of whom are gullible enough to fall for the most simple scams. Shooting fish ...
Continue Reading

VERY Positive Beta Results Home Internet Security Course

You may know that we are coming out with an Home Internet Security Course for consumers. Why? When we asked the participants who finished our enterprise Kevin Mitnick Security Awareness ...
Continue Reading

Upper Management Often Ignores IT Security Policy

Over the years I have had a nagging suspicion that only today was confirmed. I ran into a study done last year done by a company called Cryptzone who interviewed 300 IT Security ...
Continue Reading

Facebook Graph Search Is Social Engineering Bonanza

Zuck has come out with something new, and you always need to watch it when that happens. It's a combination of big data and social networking so that people can easily find new friends, ...
Continue Reading

Here are the 20 people that did the Beta first

And got their $20 Amazon Gift card sent to them today. Again, thanks very much for participating in the Kevin Mitnick Home Internet Security Training. The overall feedback was incredibly ...
Continue Reading

Healthcare Security Awareness Training

KnowBe4 and it's CEO Stu Sjouwerman (pronounced shower-man) were featured in For The Record Magazine, a leading publication for Healthcare. The article was about the risks of Bring Your ...
Continue Reading

CyberheistNews vol3, #02

Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews