Try for Free
Demo Centre

Back to Work: How to reduce cyber risks for returning employees

Many people across the globe will be looking to make the transition back into work following the period of lockdown. Here, we outline the main user-focused cyber risks and how to mitigate them.

Read more

Coronavirus Scammers: Help your users spot Covid-19 phishing emails

As the coronavirus pandemic evolves, scammers are now using the fear of the public to capitalise on the panic as a method of stealing money and data.

Read more

12 Security Awareness Training Topics you Need to Know in 2020

In 2020, it is becoming more important than ever to educate and train end users on cyber security best practice in the workplace. Below we have listed the 12 topics to look out for. 

Read more

Social Engineering Explained: Reduce Your Employee Cyber-Security Risk

Social engineering is a form of cyber-security hacking that leverages the weakest point of any security system: the End User.

Read more

The Holiday Phish: 39% of Employees Gave Away their Passwords in this Simulation

It’s half past four on a Thursday afternoon. You’re getting through your last tasks of the day, when you receive a new email. It has an alluring title:

Read more

Phishing Emails: Type's, Example's and Definition's

Phishing scams have been making a lot of headlines recently. But what exactly is phishing, what does a phishing email look like, and how do you protect your business from employee phishing attacks?

Read more

The Real Reason Why Phishing Attacks Are So Successful

Successful phishing attacks are increasing at a rapid rate, and so too are the variety of forms they come in.

Read more

Business Email Compromise (BEC) | The $9B Cyber Scam

Like pretty much everything in cyber, employee-targeted scams are growing at a huge rate - and Business Email Compromise (BEC) is no exception. Here’s what you need to know about this incredibly lucrative scam.

Read more

The Three Stages Of a Phishing Attack - Bait, Hook And Catch

We've all heard of phishing attack and how damaging they can be. But how do they work in practice, and what are the 3 steps of a phishing attack?

Read more

The Most Common Examples Of A Phishing Email

Maybe you and your colleagues have scrubbed up on the tell-tale sign of a phishing email, but are you be able to spot these highly-sophisticated fraudulent emails? Let’s find out...

Read more

There's Plenty More Phish in the Sea

Phishing is one of the most common and dangerous attacks that any company or individual faces. It seems there is a different type of phishing attack tailored to everything on the internet. But what are the most dangerous?

Read more

The Rise of Hashtag Phishing

Hashtags help companies build awareness, grow engagement and create lasting relationships with customers. They are fantastic in every way - until they get hijacked.

Read more

What Is Smishing? | The Phishing Scam That Fits In The Palm Of Your Hand

Smishing is becoming one of the most commonly used variants of phishing. This very simple method of phishing is fooling many people daily. Why is it so successful?

Read more