News and Insights
Get the latest Click Armor news and expert insights to help you fight phishing, social engineering scams and other risks related to human behaviors.
Cyber travel scams: The biggest scams to be aware of when planning your next trip
If you are planning your next jetsetting vacation, you must be aware of the cyber travel scams taking over the internet. Scammers know there’s money to be had in the travel industry and are ready to capitalize on it. Not only do travel plans require lots of capital,...
CDK Global cyber attack: What businesses can learn & implement
The CDK global cyber attack left thousands of North American automotive dealerships inoperative after the SaaS platform was forced to go offline. The breach has been making major headlines as dealerships representing the biggest names in the automotive industry...
The five most common pitfalls of cyber security awareness training
There are five common pitfalls of cyber security awareness training that are likely to send a security manager looking for a new platform. Some companies attempt to build the training content themselves, while others search externally. However, either option can fall...
Cyber Lingo: Social engineering definition & examples
Welcome to the newest edition of Cyber Lingo, “Social engineering definition and examples”. As the title explains, today we’ll tackle one of the most common tactics used in the cyber security world: Social engineering. Although it is a common framework for cyber...
The dos and don’ts of gamified cyber security training
The proper use of gamified cyber security training can make a huge impact on the safety of your business. But, that’s the key: Using it properly. Many organizations think gamified learning is just about “fun and games”. When really, gamification is a way to create...
How to train unmotivated employees in cyber security
Security awareness managers can pull out all their tricks, but still struggle to train unmotivated employees in cyber security. These disengaged individuals, who don’t care to understand the potential effects of their actions, are a huge vulnerability to any...
Cyber Lingo: What is pretexting in cyber security?
Pretexting in cyber security is commonly used but not widely known. When employees don’t know what pretexting is - or how convincing it can be - it makes them more vulnerable to the tricks of a cyber criminal. By teaching your team members the definition,...
Risk vs. Threat vs. Vulnerability: What is the difference?
The words risk, threat, and vulnerability are commonly used interchangeably, but they mean different things. Understanding these definitions can help managers plan better and employees understand more easily. In this blog, we’ll go over the definitions of risk,...
Brand impersonation attacks: How to take responsibility for your customers
Brand impersonation attacks are the reason your security awareness strategy shouldn’t end internally. Although it’s easy to put up your hands and say, “Not my problem”, security managers must take responsibility for the attacks affecting customers under the company...
FUD: How Fear, Uncertainty, and Doubt can ruin your security program
One of the greatest threats to security culture isn’t a piece of malware or an evil scammer, it’s FUD. Fear, Uncertainty, and Doubt, collectively known as FUD, can wreak havoc on your security culture if it gets out of control. Many security awareness managers...
London Drugs cyber attack: What businesses can learn from its week-long shutdown
London Drugs cyber attack: What businesses can learn from its week-long shutdown The London Drugs cyber attack has been making headlines throughout the country. What makes this breach unique, is the impact it has had on operations and customer access. Following the...
Tips and stories for your team on World Password Day
Happy World Password Day! As security awareness managers, these named events and days can be critical tools for our security programs. They generate buzz and stick in people’s minds. May 2nd 2024 is probably the easiest day to teach your team members about passwords,...
Cyber Lingo: What is biometric authentication?
As businesses are evaluating new authentication strategies you may be wondering, what is biometric authentication? And is it the right one for us? Every business is different, so there is no straight-up answer for which authentication process is best for everyone. But...
The XZ backdoor: What security managers can learn
The recent XZ backdoor attack is the perfect example of the increasing use of supply chain attacks. In 2023, Cyber Security Magazine reported that supply chain attacks were up 633%. The reason? It’s harder for businesses to monitor third-party tools than it is for...
Small business cyber security guide: What you should prioritize & where you should spend your budget
Welcome to our Small Business Cyber Security Guide. Many small businesses are just starting out and don’t have the same resources large corporations have to protect their data. Not only do they likely not have the funds to support a diverse security program, but they...