The 10 most common cyber security myths

The 10 most common cyber security myths

Is it a cyber security truth or a cyber security myth? Cyber crime is on the rise, and a large part of combating it starts with understanding the threats that exist. Unfortunately, numerous myths about cyber security persist which can lead to complacency or an...
Three key variables you need to optimize for a successful phishing simulation program

Three key variables you need to optimize for a successful phishing simulation program

As phishing simulations become a common method of testing employee vulnerability to phishing attacks, there are a variety of approaches and styles used to run these types of campaigns, which are often driven by different objectives from various stakeholders. For...