News and Insights
Get the latest Click Armor news and expert insights to help you fight phishing, social engineering scams and other risks related to human behaviors.
When employees have conflicting priorities they may take actions that they think will make them most productive. This can introduce risks into business processes. Management has to take some responsibility beyond saying “be more careful.”
There are many ways that weaknesses in a business process can be exploited by an attacker. This case study illustrates how a contractor was scammed by a fake pricing proposal with updated payment information.
Achieving compliance should not be the goal of a board of directors or C-suite. Aiming for a more mature risk-based approach that uses gamified learning will provide better assurance, and better value that traditional compliance-based security awareness training.
If your organization’s security awareness training is causing training fatigue, can it really be helping employees to resist cyber attacks?
When hackers attempt to hijack your email account, there may be some clues that will tip you off. But with the right conditions, an attacker may be able to reset your email password and access many accounts you have access to. In this example, an engineer in San Francisco lost $100,000 in crypto currency this way.
While attackers may use emotions to get their targets to expose information and grant access without proper authorization, at Click Armor, we use other types of psychological triggers to engage people to learn about cybersecurity. As part of our on-boarding process,...
Recently, I presented at the BSides Ottawa security conference on the topic of using "Games" vs. "Simulations" for gamified cybersecurity eLearning programs. This event had over 500 security professionals and two days of activities and presentations. In my session, I...
Live phishing assessments and self-paced gamified phishing simulations are complementary methods for ensuring employee proficiency in spotting phishing attacks.
Big Data is having a big impact in business, and its privacy implications can affect both companies and their employees.
Did you know that many SMART devices that are part of the Internet of Things are built with weak passwords that can’t be changed? This is a dangerous product flaw, and cyber attackers are now hacking millions of unprotected devices that are exposed to the Internet.
Over the past year, many of you have heard me mentioning that I believe “Game-Based Learning” techniques can vastly improve the effectiveness of cyber security training. Well, I’ve been very busy this summer building a team to bring this concept to life as a new cloud-based solution for businesses.