[Cybersecurity Awareness Month] Keeping Your Mobile Devices Secure from the ‘Inside’ Out

As remote work and connecting while traveling has become the norm, mobile device security responsibilities have also increased.
Continue Reading

[Cybersecurity Awareness Month] Responding to Cyber Incidents the ‘Inside Man’ Way: Fiona's Approach

In a world where cybersecurity incidents are no longer a matter of if they will happen, but when, having a solid incident response plan is a critical component of cyber resilience and ...
Continue Reading

[Cybersecurity Awareness Month] From ‘The Inside Man’ to Real Life: AI's Role in Modern Cyber Threats

AI and AI-generated deepfakes are proving to be the most intriguing, and in some ways troubling, recent advances in technology.
Continue Reading

The Inside Man Biggest Fan Contest is Heating Up

We are halfway through our annual The Inside Man Biggest Fan Contest, and we already have some amazing entries! Encourage your users to get their entries posted to social media by the end ...
Continue Reading

[Cybersecurity Awareness Month] Prepare for All Manner of Cyber Threats Like the Heroes of ‘The Inside Man’

Mark Shepherd, the Inside Man, is on a mission.
Continue Reading

U.K. Management Almost Twice as Likely to Fall for Phishing Attacks Versus Entry-Level Employees

Highlights from a new survey focused on employee compliance reveals just how targeted and susceptible U.K. businesses are to phishing attempts.
Continue Reading

Celebrating Cybersecurity Awareness Month with KnowBe4: Insights from Our Valued Customers

To celebrate Cybersecurity Awareness Month this year, KnowBe4 customers from various industries and backgrounds are sharing their innovative and exciting approaches to promote ...
Continue Reading

[Cybersecurity Awareness Month] Mindful Defense: Enchantments Against Spear Phishing By Breachatrix le Phish

In the mystical realm of cyberspace, where digital forests hold secrets and virtual owls deliver messages, we find ourselves in a constant dance between magic and deception. Today, join ...
Continue Reading

[Cybersecurity Awareness Month] How To Stop the Ransomwolf Attacks: Similarities to the Werewolves Terrors

Imagine a monstrous entity emerging from the shadows to prey on vulnerable organizations, leaving havoc in its wake. No, we are not talking about ghoulish and scary creatures of the ...
Continue Reading

[Cybersecurity Awareness Month] Password Security: Do Not Get Bit by Count Hackula

Our login credentials of a username and password are sometimes all that stands between our personal identifiable information and cybercriminals. Count Hackula could be waiting in the ...
Continue Reading

[FREE RESOURCES] Celebrate Cybersecurity Awareness Month This October with our Cyber-Monsters!

Cyber threats can be scary, and for good reason.
Continue Reading

[Cybersecurity Awareness Month] Spoofy Steve's Business Email Compromise Scams You Need to Watch Out For

Like a ghost, most business email compromise (BEC) scams are able to sneak through most technical defenses and end up in end-user inboxes.
Continue Reading

[Cybersecurity Awareness Month] Frankenphisher – The Monster of Social Engineering Artificial Intelligence

Imagine an artificial intelligence (AI) system developed by a mad scientist to leverage the full capabilities of Large-Language-Models (LLM).
Continue Reading

[FREE RESOURCE KIT] Cybersecurity Awareness Month Kit 2023 Now Available

Get the resources you need to help keep your users safe from malicious social engineering attacks during this year's Cybersecurity Awareness Month with our free resource kit.
Continue Reading

What Happens to an Organisation When It Has No Security Culture?

Let’s begin by looking at what culture is and why it matters. Culture is tacit and elusive in its very nature. It is often unspoken, based on behaviours, hidden in the thoughts and minds ...
Continue Reading

Scary Metaverse - Cybersecurity Risk Implications

The Metaverse, while still mostly a concept at the moment, consists of the possibilities that arise when you combine the advances and affordability in extended reality (XR) space with the ...
Continue Reading

Scams, Scams, Everywhere!

Scammers have been around as long as history has been recorded. Think about the famous ‘Trojan Horse’ for example. A perfect scam that allowed attackers to get behind the city walls. The ...
Continue Reading

Top 5 Phishing Do's & Don'ts

Here's the Top 5 Do’s and Don'ts for your phishing simulation exercises.
Continue Reading

[Eye Opener] FBI Warns Against New Business Identity Compromise (BIC). Top 5 Deepfake Defenses

The FBI warns that synthetic content may be used in a “newly defined cyber attack vector” called Business Identity Compromise (BIC) Imagine you're on a conference call with your ...
Continue Reading

Do Not Use Easily Phishable MFA and That Is Most MFA!

Everyone should use multifactor authentication (MFA), where they can, to protect valuable information. Everyone!
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews