Essential Best Practices for Cyber Awareness Training
“The only rules that really matter are these: what a man can do and what a man can’t do. Savvy?” - Captain Jack Sparrow
3 min read
“The only rules that really matter are these: what a man can do and what a man can’t do. Savvy?” - Captain Jack Sparrow
3 min read
Imagine your personal login details being swiped from one site, then used to break into your accounts elsewhere. Sounds intrusive, right?
2 min read
BEC, or Business Email Compromise, affects companies of all sizes. After gaining access to or knowledge of a trusted colleague or business partner's...
2 min read
Clone phishing, to put it simply, is an email's evil twin. It’s an unexpected duplicate of an email that you’ve received, but the twist? You know...
2 min read
The EU AI Act has officially passed!
2 min read
At this point, social media is a part of our daily routine. And what’s even more common is businesses using social media to promote, sell, and have...
2 min read
Cybersecurity Awareness Month—love it or hate it, there's no denying it's like the Marmite of corporate initiatives. Every October, organizations...
5 min read
We believe that being safe at work starts by being safe at home.
3 min read
In this blog we’re going to throw down the gauntlet, launch a few thought grenades and hopefully challenge conventional thinking. That doesn’t mean...
3 min read
Working from home does have its perks—saving on lunch costs, taking mid-day walks, and even swapping out your office chair for a yoga ball. But with...
2 min read