Human Risk Management Blog

Security Awareness Training

Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.

Will Your Contractors Take Down Your Business?

Will Your Contractors Take Down Your Business? Do you know how well your vendors, business associates, contracted third parties (who I will collectively call “contractors”) are protecting ...

Starbucks Hack: A Great Example Why You Should Not Reuse Passwords

Use this story and send it to your employees as a cautionary tale to make it real to them they should not reuse passwords in general, but especially not for any online payment accounts! ...

Get Real About User Security Training

Do you despair that users will never learn to avoid stupid security mistakes that compromise your organization? Maybe you're not spending enough time and effort on training. Roger Grimes ...

Phishing in the C-Suite: 96% of Executives Vulnerable to Attacks

According to a recent survey, 96% of executives failed to tell the difference between a real email and a phishing email 100% of the time.

What our customers are saying about our security awareness training

One of our customers sent us this today: "I wanted to give you an update on our security awareness training. When we did the baseline phishing campaign for 85 employees and we had a click ...

10 Lessons Learned From Painful Ryanair $5M Cyberheist

Low-cost airline Ryanair shamefacedly came clean last week that they fell victim to a cyberheist which stole almost 5 million dollars out of its fuel bank account. The money was siphoned ...

Social Engineering Exploit Fools HR with Infected IT Resumes

Proofpoint threat researchers recently detected a clever email-based attack that combines phishing and social engineering techniques in order to trick users into opening a malicious ...

Tesla Attack Caused By Social Engineering

A few days ago, you may have read the news that Tesla Motors had their website and Twitter accounts hijacked by pranksters. OpenDNS has a blog post that goes into great technical detail.

Ransomware Mafia Now Uses Bitcoin As Obfuscation Layer

Bitcoin is a very speculative currency, still relatively easy to manipulate compared to the major currencies, and subject to massive increases and drops in value. Currently the falling ...

How Criminals Exploit Gaps In Your Security Awareness Training

I was at RSA in San Francisco last week. Great show, with ~30,000 attendees and packed exhibit halls at the Moscone Center. We invited KnowBe4 customers who were attending RSA for a ...

The 5 Security Awareness Training Generations [CARTOON]

Today, your employees are frequently exposed to advanced phishing and ransomware attacks. Your users are the weak link in your IT security. There are 5 ways (generations) to train ...

If You Think Security Awareness Training is Expensive, Try Ignorance

Facts surrounding spear phishing all point to employees as the most cited culprits and security awareness training as the most effective remedy. Yet all training programs are not equal. ...

So, What Is The Real Reason The White House Got Hacked?

According to a new CyberEdge research survey of 19 sectors, including government, spearphishing is the biggest concern to IT security pros, more worrisome than even malware. And only 20 ...

SHOCKER: Data Breaches Cost Big Companies Very Little

Two articles today in Fortune Magazine and Harvard Business Review each lifted a piece of the veil about a dirty little secret about data breaches. From Home Depot to Target to Sony, big ...

IBM: 'Dyre Wolf' Cyber Gang Uses Spear Phishing For $1 Million Cyberheists

Last week, IBM Security reported on an active cyberheist campaign using a variant of the Dyre Trojan that has successfully stolen more than $1 million at a time from targeted enterprise ...

Experts: Social Engineering Attacks Harder To Stop

Michael Heller at TechTarget wrote a good longish article where he concluded: "As more personal and corporate information is shared on the Web, social engineering techniques and attacks ...

How to get your Phish-prone percentage up. Up? Yes, Up.

Something surprising happened last week. A few of our customers reported that their phish-prone percentage was going up. Up? Yes, up. Not something you normally would expect or ...

Premera And Anthem Both Hacked Using Shrewd Social Engineering

Health records are the new credit cards. They have a longer shelf life and are often easier to get. There are more opportunities for fraud. No wonder that bad guys are after them with a ...

Why your brain shuts down when you see a security alert

Been mystified why end-users do not seem to get it? Their eyes glazing over when a security alert pops up on their screen? Brand new neuroscience research using MRI shows a dramatic drop ...

Despite Mobile App Risks Enterprise Does Not Have Mobile Security Policy

Here is the disconnect: 82 percent of IT pros think that BYOD in the workplace has “very significantly” or “significantly” increased IT security risks, less than half of organizations ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.