Enhanced Phishing Training: Dealing with Today's Threats
If you’ve been involved in a phishing scenario where the attack was successful, it’s pretty hard to gain a sense of trust when plugging in a device to the office network,...
2 min read
If you’ve been involved in a phishing scenario where the attack was successful, it’s pretty hard to gain a sense of trust when plugging in a device to the office network,...
2 min read
The Network and Information Security Directive, known as NIS2 and effective beginning October 17, 2024, requires Member States to adopt and publish...
2 min read
Whenever you’re surfing the internet, every click, search, and scroll leaves behind a small trace known as a digital footprint. While it might seem...
2 min read
“The only rules that really matter are these: what a man can do and what a man can’t do. Savvy?” - Captain Jack Sparrow
3 min read
Imagine your personal login details being swiped from one site, then used to break into your accounts elsewhere. Sounds intrusive, right?
2 min read
BEC, or Business Email Compromise, affects companies of all sizes. After gaining access to or knowledge of a trusted colleague or business partner's...
2 min read
Clone phishing, to put it simply, is an email's evil twin. It’s an unexpected duplicate of an email that you’ve received, but the twist? You know...
2 min read
The EU AI Act has officially passed!
2 min read
At this point, social media is a part of our daily routine. And what’s even more common is businesses using social media to promote, sell, and have...
2 min read
Cybersecurity Awareness Month—love it or hate it, there's no denying it's like the Marmite of corporate initiatives. Every October, organizations...
5 min read