One aspect of our most recent offering – an active adversary phishing simulation – is the tracking we perform on a very certain metric. When we’re engaging a business to measure their response to phishing attempts by bad guys, we carefully track the ‘clicks‘ on the links we send. In other words, we want to know when users click on links. Knowing that, we know who needs specific training on

Social Media Security is a topic that affects everybody. You might think that by not having an account on a popular social media site, you’re safe from the same type of social engineering attacks that affect active users. That might be just the kind of reaction a social engineer is looking for. Cybersecurity is usually seen as a series of blinking lights – little devices that sit in a server