AREN'T BLOGS FUN?? THIS IS OURS.
In this webinar, Habitu8 cofounders Jason Hoenich and Chad Loder discuss how to put together a phishing simulation training program.
This is the world of social engineering—i.e., tricking people out of private information. It’s cheap, easy, and terrifyingly effective. Here are some of hackers’ favorite ways of using social engineering.
Security Awareness 2.0 is a revolutionary approach that makes training not only more effective, but more enjoyable. Shifting to Security Awareness 2.0 requires a change in attitude and adopting a few basic principles.
National Cyber Security Awareness Month (NCSAM) is a big deal. Occurring every October, NCSAM started life as an American effort and has grown into a worldwide phenomenon. In this webinar, founders Jason Hoenich and Chad Loder use real-world knowledge to discuss how to use NCSAM to engage coworkers and create unique experiences.
Should you train your contractors in cyber security awareness? The short answer is YES, but there are important HR and legal issues you need to consider before rolling it out. If you approach this without careful planning, you could run afoul of taxation and labor laws governing the classification of employees vs. independent contractors. Read on to understand how to navigate this issue and get everyone trained up!
Like many corporate workshops, security awareness trainings have a reputation for being deadly dull. For organizations that want to counter cyberattacks, boredom is a real barrier to fostering a security culture.
We’re stuck in the space of not wanting to acknowledge how crucial and important the process of security awareness program management is with vendors wanting to push and sell a magic product that “does everything”.
Collecting metrics in a constantly changing risk environment can be challenging, especially given the lack of universally accepted measurements. The good news is that there are straightforward ways of obtaining accurate, useful metrics. Here are five ways of securing important metrics.
Security Conferences like RSA and Blackhat are destroying the planet with swag. Should your Security Awareness Program join the destruction?