The Phishing Assessment Optimizer™ helps avoid frustrations, distractions, and PR nightmares

The Phishing Assessment Optimizer™ helps avoid frustrations, distractions, and PR nightmares

Most of us have either been on the giving or receiving end of a “phishing assessment” (also called phishing tests, mock phishing exercises, or phishing simulations). I have run live email phishing assessments for many different customers in the past 10 years, and have...
Employees need realistic phishing simulations to break the kill chain of cyberattacks

Employees need realistic phishing simulations to break the kill chain of cyberattacks

Businesses should pay attention to the joint advisory from the Cybersecurity and Infrastructure Security Agency (CISA) in the USA that highlights a growing pattern of newly announced malware infections that have impacted municipal water and wastewater systems (WWS)...
Cyber stories for executives: Using the Guntrader data breach to help get executive buy-in for cyber security investment

Cyber stories for executives: Using the Guntrader data breach to help get executive buy-in for cyber security investment

TL:DR – Anyone trying to convince management (internally or externally) of the need to invest in cyber security must start by highlighting relevant examples of risk management failures that appeal to both their logical reasoning and their “croc brains” on the...