News and Insights

Get the latest Click Armor news and expert insights to help you fight phishing, social engineering scams and other risks related to human behaviors. 

Cyber Lingo: Social engineering definition & examples

Cyber Lingo: Social engineering definition & examples

Welcome to the newest edition of Cyber Lingo, “Social engineering definition and examples”. As the title explains, today we’ll tackle one of the most common tactics used in the cyber security world: Social engineering. Although it is a common framework for cyber...

read more
The dos and don’ts of gamified cyber security training

The dos and don’ts of gamified cyber security training

The proper use of gamified cyber security training can make a huge impact on the safety of your business. But, that’s the key: Using it properly. Many organizations think gamified learning is just about “fun and games”. When really, gamification is a way to create...

read more
How to train unmotivated employees in cyber security

How to train unmotivated employees in cyber security

Security awareness managers can pull out all their tricks, but still struggle to train unmotivated employees in cyber security. These disengaged individuals, who don’t care to understand the potential effects of their actions, are a huge vulnerability to any...

read more
Cyber Lingo: What is pretexting in cyber security?

Cyber Lingo: What is pretexting in cyber security?

Pretexting in cyber security is commonly used but not widely known. When employees don’t know what pretexting is - or how convincing it can be - it makes them more vulnerable to the tricks of a cyber criminal. By teaching your team members the definition,...

read more
Risk vs. Threat vs. Vulnerability: What is the difference?

Risk vs. Threat vs. Vulnerability: What is the difference?

The words risk, threat, and vulnerability are commonly used interchangeably, but they mean different things. Understanding these definitions can help managers plan better and employees understand more easily. In this blog, we’ll go over the definitions of risk,...

read more
Tips and stories for your team on World Password Day

Tips and stories for your team on World Password Day

Happy World Password Day! As security awareness managers, these named events and days can be critical tools for our security programs. They generate buzz and stick in people’s minds. May 2nd 2024 is probably the easiest day to teach your team members about passwords,...

read more
Cyber Lingo: What is biometric authentication?

Cyber Lingo: What is biometric authentication?

As businesses are evaluating new authentication strategies you may be wondering, what is biometric authentication? And is it the right one for us? Every business is different, so there is no straight-up answer for which authentication process is best for everyone. But...

read more
The XZ backdoor: What security managers can learn

The XZ backdoor: What security managers can learn

The recent XZ backdoor attack is the perfect example of the increasing use of supply chain attacks. In 2023, Cyber Security Magazine reported that supply chain attacks were up 633%. The reason? It’s harder for businesses to monitor third-party tools than it is for...

read more