News and Insights

Get the latest Click Armor news and expert insights to help you fight phishing, social engineering scams and other risks related to human behaviors. 

The dos and don’ts of gamified cyber security training

The dos and don’ts of gamified cyber security training

The proper use of gamified cyber security training can make a huge impact on the safety of your business. But, that’s the key: Using it properly. Many organizations think gamified learning is just about “fun and games”. When really, gamification is a way to create...

read more
How to train unmotivated employees in cyber security

How to train unmotivated employees in cyber security

Security awareness managers can pull out all their tricks, but still struggle to train unmotivated employees in cyber security. These disengaged individuals, who don’t care to understand the potential effects of their actions, are a huge vulnerability to any...

read more
Cyber Lingo: What is pretexting in cyber security?

Cyber Lingo: What is pretexting in cyber security?

Pretexting in cyber security is commonly used but not widely known. When employees don’t know what pretexting is - or how convincing it can be - it makes them more vulnerable to the tricks of a cyber criminal. By teaching your team members the definition,...

read more
Risk vs. Threat vs. Vulnerability: What is the difference?

Risk vs. Threat vs. Vulnerability: What is the difference?

The words risk, threat, and vulnerability are commonly used interchangeably, but they mean different things. Understanding these definitions can help managers plan better and employees understand more easily. In this blog, we’ll go over the definitions of risk,...

read more
Tips and stories for your team on World Password Day

Tips and stories for your team on World Password Day

Happy World Password Day! As security awareness managers, these named events and days can be critical tools for our security programs. They generate buzz and stick in people’s minds. May 2nd 2024 is probably the easiest day to teach your team members about passwords,...

read more
Cyber Lingo: What is biometric authentication?

Cyber Lingo: What is biometric authentication?

As businesses are evaluating new authentication strategies you may be wondering, what is biometric authentication? And is it the right one for us? Every business is different, so there is no straight-up answer for which authentication process is best for everyone. But...

read more
The XZ backdoor: What security managers can learn

The XZ backdoor: What security managers can learn

The recent XZ backdoor attack is the perfect example of the increasing use of supply chain attacks. In 2023, Cyber Security Magazine reported that supply chain attacks were up 633%. The reason? It’s harder for businesses to monitor third-party tools than it is for...

read more
Tax scams: Scams to be aware of this tax season

Tax scams: Scams to be aware of this tax season

As tax day approaches, now is a crucial time to educate yourself and your team members on tax scams they may see in the upcoming weeks. During tax season, emotions are high. People are stressed about completing their tax returns on time, worried about missing...

read more
Cyber Lingo: OpSec meaning & uses

Cyber Lingo: OpSec meaning & uses

Welcome to the second edition of our Cyber Lingo Series, in this edition we will unravel the popular search “OpSec meaning” and delve into the definition of OpSec and its military history. If you didn’t catch our first blog of the Cyber Lingo series, we take the...

read more