How to persuade your people to act securely?

How to persuade your people to act securely?

June 29, 2023

When making a decision, it would be great if people consider all available information to guide their thinking. But the reality is very often different!

read more
Too soon, too late, just right – Our Goldilocks theory of security awareness

Too soon, too late, just right – Our Goldilocks theory of security awareness

June 1, 2023

Kate's a typical knowledge worker; she works hard in her office, meeting deadlines and achieving her objectives. She’s going through a busy period of work and suddenly she need to face a difficult...

read more
When work and security awareness collide… - Kate's Story

When work and security awareness collide… - Kate's Story

March 31, 2023

Kate's a typical knowledge worker; she works hard in her office, meeting deadlines and achieving her objectives. She’s going through a busy period of work and suddenly she need to face a difficult...

read more
5 mistakes when tackling the human aspect of cyber security

5 mistakes when tackling the human aspect of cyber security

February 3, 2023

Whilst things are improving, we still see some key mistakes being made in the way many organisations approach this.

read more
Tackling misdirected emails through behaviour change

Tackling misdirected emails through behaviour change

March 10, 2022

Misdirected emails are very frequent and unfortunately, still one of the most common causes of data breaches.

read more
How narrative-based learning can improve your awareness strategy?

How narrative-based learning can improve your awareness strategy?

February 10, 2022

People love a good story. Improve your cyber awareness strategy with narrative-based learning, which is highly effective at increasing comprehension.

read more
Science applied: how to motivate users to do security training

Science applied: how to motivate users to do security training

February 3, 2022

Protection Motivation Theory says we assess Threat and our ability to Cope in a risky situation... Cyber security awareness needs to reflect this...

read more
Science applied: B=MAP - 3 steps to secure behaviour change

Science applied: B=MAP - 3 steps to secure behaviour change

February 3, 2022

BJ Fogg's B=MAP model can help us drive secure behaviour and make the transition from cyber security awareness training to secure behaviour change...

read more
How to adapt your security training when working from home

How to adapt your security training when working from home

January 21, 2022

We haven’t settled on a “New Normal”, work context will continue to change for the foreseeable future. It’s time for security awareness to adapt.

read more