Cyber Insurance: Is Paying a Ransom Counter-Productive?
Food for thought as discussed on May 18, 2023, an article posted in The Australian Insurance Council: Banning paying a ransom to cyber hackers is counter-productive where Andrew Hall, the ...
Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.
Food for thought as discussed on May 18, 2023, an article posted in The Australian Insurance Council: Banning paying a ransom to cyber hackers is counter-productive where Andrew Hall, the ...
The Associated Press warned this week that AI experts have raised concerns about the potential impact of deepfake technology on the upcoming 2024 election. Deepfakes are highly convincing ...
The evidence is clear – there is nothing most people and organizations can do to vastly lower cybersecurity risk than to mitigate social engineering attacks. Social engineering is ...
The U.S. government created a new office to block disinformation. The new Foreign Malign Influence Center (FMIC) oversees efforts that span U.S. military, law enforcement, intelligence, ...
Do you spend too much time creating custom security awareness reports for your C-suite or board of directors? If so, we’re happy to share our new KMSAT feature, Executive Reports.
It's May the 4th, a holiday that celebrates our love for a galaxy far, far, away - Star Wars! I can't help but share some cybersecurity learning lessons from one of my favorite Sci-Fi ...
Compromised websites (legitimate sites that have been successfully compromised to support social engineering) are serving visitors fake Google Chrome update error messages.
Security teams face unique challenges in today’s rapidly-changing landscape of phishing, malware, and other social engineering and cybersecurity threats. Collaboration across disparate ...
Check out the 19 new pieces of training content added in April, alongside the always fresh content update highlights, events and new features.
Money mules play a subordinate but important role in the criminal economy. They’re used to move stolen funds around, a low-level version of illicit remittance and money laundering. ...
The human factor is involved in 82% of data breaches, according to the 2022 Verizon Data Breach Investigations Report. Cybercriminals use social engineering techniques like phishing, ...
Check out the 49 new pieces of training content added in March, alongside the always fresh content update highlights, events and new features.
This MIT Technology Review headline caught my eye, and I think you understand why. They described a new type of exploit called prompt injection.
Mid-sized businesses – those with 250 to 2000 employees – don’t appear to have what they need to fend off attacks in a number of critical ways.
New global data shows that those government employees that work solely in the office are the new minority, IT lacks visibility, and user actions put the government at risk.
I remember sitting in Stu Sjouwerman’s office with Perry Carpenter and myself being pitched a drama series about cyber security by Jim Shields (Creative Director - Twist & Shout) and ...
We’re thrilled to announce the long-awaited fifth season of the award-winning KnowBe4 Original Series - “The Inside Man” is now available in the KnowBe4ModStore!
Younger employees need to be wary of oversharing company information on social media, according to John Karabin, senior director of cybersecurity at NTT Ltd. In an article for ...
A journalist based in Ecuador recently used a USB flash drive that was actually a legitimate bomb.
A new law in Québec, Canada, that goes into effect this June will require all policies and training materials assigned to employees within the province be provided in French.