One aspect of our most recent offering – an active adversary phishing simulation – is the tracking we perform on a very certain metric. When we’re engaging a business to measure their response to phishing attempts by bad guys, we carefully track the ‘clicks‘ on the links we send. In other words, we want to know when users click on links. Knowing that, we know who needs specific training on

Social Media Security is a topic that affects everybody. You might think that by not having an account on a popular social media site, you’re safe from the same type of social engineering attacks that affect active users. That might be just the kind of reaction a social engineer is looking for. Cybersecurity is usually seen as a series of blinking lights – little devices that sit in a server

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.