Skip to the main content.

Bloggin’!

Turn and face the strange. We have all sorts of helpful posts here to get you leveled up ASAP. From cutting edge changes to best practices, we've got you covered.

Cyber Basics

a laptop keyboard with a sticky note on it that says

Understanding Credential Stuffing

Imagine your personal login details being swiped from one site, then used to break into your accounts elsewhere. Sounds intrusive, right?

2 min read

The Ultimate Guide Against BEC Attacks

BEC, or Business Email Compromise, affects companies of all sizes. After gaining access to or knowledge of a trusted colleague or business partner's...

2 min read

a man stares confusedly at two identical emails

Seeing a Malicious Digital Double: A Clone Phishing Breakdown

Clone phishing, to put it simply, is an email's evil twin. It’s an unexpected duplicate of an email that you’ve received, but the twist? You know...

2 min read

a web of digital profiles

Mastering Social Media Safety: Shielding your Business from Cyber Threats

At this point, social media is a part of our daily routine. And what’s even more common is businesses using social media to promote, sell, and have...

2 min read

a row of houses, one has a lit lightbulb above it

How to be the Safest Cyber House on the Block

We believe that being safe at work starts by being safe at home.

3 min read

The Impacts and Risks of Neglecting Cyber Awareness Training

In this blog we’re going to throw down the gauntlet, launch a few thought grenades and hopefully challenge conventional thinking. That doesn’t mean...

3 min read

a cat rests on the couch with his paws on a keyboard

From Couch to Keyboard: Safe Online Practices for Remote Workers

Working from home does have its perks—saving on lunch costs, taking mid-day walks, and even swapping out your office chair for a yoga ball. But with...

2 min read

thumbtacks with a neat web of string next to a loose thread

The Impact of IoT

The focus often remains on traditional information security topics like password management, phishing detection, and data protection policies has...

3 min read

several unlit lightbulbs dangle from the ceiling, one bulb is lit off on its own

The Future of Cyber Awareness: Staying Ahead of Emerging Threats

From advanced malware to modern phishing schemes, cybercriminals are continually developing new methods to exploit human vulnerabilities. Thankfully,...

2 min read

an elderly woman's hands operate a computer mouse

Digital Safety: Securing the Golden Age

Here at Cybermaniacs, we believe that cybersecurity education should extend beyond the workplace to encompass the entire family. Our goal is to...

3 min read