Cyber security awareness training

What Should Phishing Awareness Emails Contain?

What Should Phishing Awareness Emails Contain?

Phishing is the most used type of cyberattack, according to recent research. Phishing is more preferred by hackers due to reasons such as being easier to prepare, adapting to different forms. In addition to those, it causes companies to lose more money to than any other cyberattack and it is [...]

Read more...

How It Really Happened: NINJIO Season 4, Episode 6, Vacation Devastation

In NINJIO’s Season 4, Episode 6, when a vacation rental goes horribly wrong, Ava takes an important lesson to heart – friend requests on social media from strangers pose a unique security threat.  This is knowledge that she resolves to pass to her daughter as clearly as possible.  It’s [...]

Read more...
Easiest Way to Train Your Employees Against Phishing

Easiest Way to Train Your Employees Against Phishing

As we all know, there has been a significant increase in phishing attacks in recent years. The increase in attacks targeting companies in particular has increased to an alarming level. According to experts, the biggest reason for these attacks is employees. Employees are said to be the biggest vulnerability [...]

Read more...

HOW IT REALLY HAPPENED : NINJIO SEASON 4, EPISODE 5, SAY IT, DON’T SPRAY IT

In NINJIO’s Season 4, Episode 5, an undercover operative has gone missing…and now it’s time to turn to a convicted hacker to find out what happened, and how a large hacking syndicate gains access to multiple accounts all over the world. Reused and recycled passwords are never a good [...]

Read more...

HOW IT REALLY HAPPENED : NINJIO SEASON 4, EPISODE 4, IT’S NOT WHAT YOU THINK…

In NINJIO’s Season 4, Episode 4, the message is shocking and uncomfortable, threatening Stuart with the release of truly embarrassing material if he doesn’t pay hackers thousands of dollars in Bitcoin.  Trying to control his destiny, Stuart discusses the email with his boss – but it might not actually [...]

Read more...

HOW IT REALLY HAPPENED: NINJIO SEASON 4, EPISODE 3, UP, UPVOTE, AND AWAY

In NINJIO’s Season 4, Episode 3, while still a little new at his job with a large, widely-followed company, Chris feels like he has a bit to prove.  This drive leads him to make a few social forum and social media posts detailing non-confirmed company information.  Now he must [...]

Read more...
Cybersecurity awareness training for employees

HOW IT REALLY HAPPENED : NINJIO SEASON 4, EPISODE 2, C’EST LA VIE, CHAMONIX

In NINJIO’s Season 4, Episode 2, the hackers have a plan, a way to bypass a large company’s MDM, or Mobile Device Management, software to gain access to their sensitive data.  Using inside contacts, custom servers, and text message phishing, they can get everything that they want – as [...]

Read more...

HOW IT REALLY HAPPENED : NINJIO SEASON 4, EPISODE 1, YOU NEVER CALL…

In NINJIO’s Season 4, Episode 1, after her husband’s wrongful arrest, Megan desperately researches what might have led to his stolen identity.  She uncovers a case of Business Email Compromise, and hurries to share what she’s learned with their lawyer.  When an email requesting sensitive information comes through, it’s [...]

Read more...

HOW IT REALLY HAPPENED : NINJIO SEASON 3, EPISODE 12, YOUR PAGE IS MY PAGE

In NINJIO’s Season 3, Episode 12, when faced with a blackmail threat regarding embarrassing messages, Emily tries to understand how hackers might have accessed her account.  Weak password practices could be to blame.  Setting long and unique passphrases for each account that you have is one of the best [...]

Read more...
The 10 Steps to Achieve Effective Cybersecurity

The 10 Steps to Achieve Effective Cybersecurity

The 10 Steps to Achieve Effective Cybersecurity – As organizations increasingly connect their operational processes to their cyber infrastructure, effective cybersecurity is key to an organization’s ability to protect its assets, including reputation, intellectual property, staff, and customers. Many companies believe that their investment in advanced technical solutions means [...]

Read more...