Blog

Old habits, new threats: SEG’s and other phishing failures

Old Habits, New Threats Phishing has been around for over 20 years now.  Unfortunately, companies are using the same old habits they’ve been using year after year, and it just NOT working anymore.  Case in point:  91% of cybersecurity leaders are frustrated with their SEGs, and 87% are considering a replacement.  Why?  With the growing sophistication of attacks, SEG’s are becoming more porous. 

Old habits, new threats: SEG’s and other phishing failures Read More »

Invasion of the TOADs

The Invasion of the TOADs TOADs are an increasingly common threat to businesses worldwide, and it’s not the kind that hop.   Are you aware that there is an average of 10 million TOAD messages sent every month?  As a matter of fact, there have been as many as 13 million TOAD messaging in one month!

Invasion of the TOADs Read More »

109 Seconds to Disaster

109 Seconds to Disaster Phishing attacks show no signs of abating, and while email is still the main vector of these attacks, only 65% of phishing attacks are now in email.  Social media, browser and search engine, and messaging application attacks are on the rise, using malicious links to dupe employees and steal corporate assets.  Training and simulations are NOT working. 

109 Seconds to Disaster Read More »

Usain Bolt racing a snail

When Snails Race Usain Bolt: The Ludicrous Pace of Cybersecurity Progress

The Ludicrous Pace of Cybersecurity Progress “The only thing we learn from history is that we learn nothing from history.” – Friedrich Hegel In the symphony of history, there are moments when a quiet murmur of innovation steadily crescendos into a triumphant roar, signaling a pivotal shift in the paradigm. In this digital era, we find

When Snails Race Usain Bolt: The Ludicrous Pace of Cybersecurity Progress Read More »

The Myth of Security Awareness: Are You Practicing Bruce Lee Moves or Just Watching His Movies?

The Myth of Cybersecurity Awareness In the expansive and often overly dramatized theater of ‘Security Awareness,’ the narrative tends to replay like a scratched DVD stuck on loop. It’s a tale woven with the same enchanting threads that tell of unicorns prancing in moonlit meadows, magic carpets defying the very laws of physics, and, of

The Myth of Security Awareness: Are You Practicing Bruce Lee Moves or Just Watching His Movies? Read More »

the trojan horse

Historical Blunders: Are You About to Commit One in Cybersecurity?

Historical Blunders History is a fantastic teacher, but only if we’re attentive students. It’s laden with tales of spectacular feats and even more memorable blunders. While stories of success can inspire, it’s the tales of monumental misjudgments that leave us in sheer disbelief. These errors, as perplexing as they may seem, are strikingly pertinent when

Historical Blunders: Are You About to Commit One in Cybersecurity? Read More »