tag = "Cyber Security Awareness Month"

What to do with Suspicious Emails (Don’t Reply!)

It is important to remember that these scammers are in fact criminals and engaging with them is like catching a tiger by the tail.

Beware of Account Takeover

However, not all phishing emails come from a fake email account that is trying to impersonate a company or a user.

Grease the Skids: Improve Training Successes by Optimizing the Environment

Take a step back from your program to consider whether the organizational climate is ripe for its success.

Training Not Sinking In? Try a Programmatic Approach

Today we're kicking off National Cybersecurity Awareness Month (NCSAM).

Nigerian 419 Scams: How to Spot a Phish

Nigerian 419 scams are as old as the internet, and they're still going. Here's our #CyberAware take on this phishing classic.

BEC Scams: How to Spot a Phish

In aid of national #CyberAware month, we take a close look at BEC phishing lures, how they work, and why they're so effective

The Impact of Phishing, and Why it Should be Your #1 Priority

With all the attention given to more "exciting" attack vectors, phishing is often ignored. But when you look at the facts, that just doesn't make sense at all.

All Phish are Not Created Equal: The Evolving BEC Scam

As cybercriminals evolve their attack methodologies, they have learned from their mistakes and BEC is an unfortunate example of how they are circumventing technology defenses and exploiting organizations' greatest vulnerability: employees.