Human Risk Management Blog

KnowBe4

Read the latest news about KnowBe4, company announcements, new product releases and updates, awards and recognitions.

'Florentine Baker Group' Use Microsoft 365 Functionality to Scam Private Equity Firm Out of $1.2 Million

A new investigation by Check Point’s Incident Response Team (CPIRT) demonstrates how brazen cybercriminals are and the lengths they will go to in order to see their scam succeed.

The Best and First Defenses You Should Implement

Every good defense has three pillars of controls: policy, technical, and education. People are always asking what they should do for each to minimize cybersecurity events the most and ...

How Sharing Personal Information Helps Scam Artists

The FBI's Charlotte office released an alert describing how scammers can use personal information on social media to break into online accounts, BleepingComputer reports. As people are ...

Third-Party Risk Management Questionnaire for Extended Emergencies

Here’s a questionnaire you can send to suppliers during extended work from home (WFH) periods.

[HEADS UP] DHS Deadline Notice of 56 Million Security Awareness Training Funding Opportunity

The Department of Homeland Security is providing $56,000,000.00 of grant money to states for cybersecurity and security awareness training.

[NEW PhishER Feature] Remove, Inoculate, and Protect Against Email Threats Faster with PhishRIP

We are excited to announce the availability of PhishRIP™ as part of the PhishER platform to all PhishER customers. PhishRIP is a new email quarantine feature that integrates with ...

Phishing Trend: Quality, Not Quantity?

A new report from CyberCube found that sophisticated cybercriminals are increasingly shifting to launching business email compromise (BEC) attacks against executives, Insurance Business ...

Removing Zoom Meeting ID's: Treating the Symptom, Not the Cause

Zoom has been under a lot of scrutiny lately, and it's commendable that the vendor has been working through as many security issues as it has. With great growth and visibility comes great ...

New Articles and Updates From the KnowBe4 Technical Content Team in Q1 2020

Here are all of the major items and updates our KnowBe4 Product Content Team has added to our knowledge base and Security Awareness Training product in Q1 2020.

[On-Demand Webinar] The Art of Invisibility: Important New Privacy Concerns for Your Quickly Evolving Remote Workforce

Corporate privacy concerns are more paramount right now than ever before. Organizations are being forced to maneuver a new world of security and privacy issues related to a remote ...

3 Lessons COVID-19 Can Teach Us About Cybersecurity

It’s day 4,823 that I’ve been home for the stay at home order in the county where I live. Okay, so it feels like years, but it’s actually only been a few weeks. Like many of you, I can’t ...

Zoom's Recent Hypergrowth Challenges -- And How To Use It In A Secure Way

The massive uptick in use of the popular video conferencing service Zoom has resulted in a rise in stock price, a class action lawsuit, and a huge opportunity for cybercriminals.

Share the Red Flags of Social Engineering Infographic With Your Employees

Social engineering and phishing are responsible for 70% to 90% of all malicious breaches , so it’s very important to keep your employees at a heightened state of alert against this type ...

March Content Update: Including Work From Home and Coronavirus Training Resources

Here are a few important updates to share with you from the month of March.

A new ransomware strain called 'Save the Queen’, distributes itself from your own Domain Controllers

Sophisticated cybercriminals have continuously improved the effectiveness of ransomware attacks, according to Yaki Faitelson, co-founder and CEO of Varonis. In an article for Forbes, ...

The Best Computer Security Solvers Look Beyond the Problem

Who doesn’t love a good computer security “cowboy”? That’s a man or a woman who is a recognized authority in their field of expertise, who groks their subject, who is truly a subject ...

70% to 90% of All Malicious Breaches are Due to Social Engineering and Phishing Attacks

If you’ve heard me speak the last two years, read any of my articles, or watched any of my webinars, you’ve probably heard me say, “Seventy to ninety percent of all malicious breaches are ...

Who Doesn’t Like Free Money? Scammers Are Expected to Increase Use of the COVID Stimulus Bill to Line their Pockets

With cybercriminals loving to be able to target victims where money is directly involved, security experts are anticipating a massive uptick in Stimulus-related scams.

Inception: Your Employee's Mind is the Scene of the Crime

I loved the movie Inception when it came out. It had everything, a stellar cast, amazing visuals, a strong plot, and a twisted end that still has me wondering whether or not they were in ...

Every Computer Defense Has Three Main Pillars

Defense-in-Depth is a dogmatic term used in the computer defense industry to indicate that every computer defense has to be made up of multiple, overlapping defenses positioned to best ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.