CurriculaTop 10 Worst Places to Store a Password — CurriculaSharing and reusing passwords is one of the easiest ways hackers can gain access to your online accounts. A recent data breach at a water…Feb 16, 2021Feb 16, 2021
CurriculaHow to Build a Security CultureWe hear about security culture a lot, and we know it’s important, but why is building a culture of security so essential for your…Jul 24, 2020Jul 24, 2020
CurriculaIs Your Security Awareness Training Program a Fire Drill?We’ve all been through fire drills in our lives, probably since our early days back in elementary school. Single file, walk, don’t run…Jul 14, 2020Jul 14, 2020
CurriculaThe Impact of Data Breaches on Our SocietyIn .66 seconds, the term ‘data breach’ returns more than 144 million results on Google. As professionals in the industry, we hear about it…Jun 12, 2020Jun 12, 2020
CurriculaHow a College Student Lost $10,000 to “The IRS” in an Apple Gift Card ScamBack when I worked in the division of student affairs, I came across an unsettling report from our university’s police department. One of…Jun 3, 2020Jun 3, 2020
CurriculaCurricula Launches Gamified Service to Report Phishing EmailsOur employees are typically the first set of real eyes for what’s coming in the door. IT teams are understaffed and overwhelmed by the…Apr 28, 2020Apr 28, 2020
CurriculaCurricula Celebrates 5 Year Anniversary of Security Awareness5 years ago today on March 9, 2015, I remember waking up and having no idea what I was doing. I mean I had a broad vision of what we were…Mar 10, 2020Mar 10, 2020
CurriculaHow to Buy a Security Awareness Training ProgramAre you in search of a security awareness training program to help educate your employees on cyber security best practices? There are lots…Jan 11, 2019Jan 11, 2019
CurriculaGDPR is the Perfect Phishing ScamAll of these GDPR notices are overwhelming. Unless you have been living under a rock, you already know that May 25th 2018 is the date that…May 22, 2018May 22, 2018
CurriculaHow to Prevent Business Email Compromise AttacksBusiness Email Compromise attacks, otherwise known as BEC attacks, are when a hacker gains access to a corporate email account, then uses…Feb 19, 2018Feb 19, 2018