5 Common Phishing Mistakes You & Your Team Are Probably Making

5 Common Phishing Mistakes You & Your Team Are Probably Making

If you haven't received a phishing email in the last twelve months, then you are a rare breed indeed. Levels of phishing have been rising in the past five years creating a global problem, that some sources such as Verizon quote as being the delivery mechanism for up to 90% of malware and ransomware.

4 Reasons Why You Should Have NetConsent On This Year's Budget

4 Reasons Why You Should Have NetConsent On This Year's Budget

There is an cartoon which often pops up on social media and IT circles, which depicts an army armed with bow and arrows, preparing for battle. Trying to get their attention, is a salesman with modern military equipment, although he is being ushered away on the premise the the army is too busy.

5 GDPR Modules Added to Innovative Training Solution OutThink

5 GDPR Modules Added to Innovative Training Solution OutThink

In bringing your workforce up to speed to ensure compliance with GDPR, you’ll require top quality information security and data privacy training content. The OutThink learning material is developed by industry experts working alongside education professionals, human-computer interaction specialists, psychologists, as well as behavioural change and communication experts.

OutThink is Recognised by GCHQ and HMG as the Leader in Cybersecurity Training

OutThink is Recognised by GCHQ and HMG as the Leader in Cybersecurity Training

Pioneers in cybersecurity culture and cognitive training solution vendor OutThink Threats has been awarded by GCHQ (Government Communications Headquarters) as a preferred supplier to government departments in the UK.

ENISA's 8 Step Plan for Building a Risk Aware Cybersecurity Culture

ENISA's 8 Step Plan for Building a Risk Aware Cybersecurity Culture

There is almost universal recognition that traditional security awareness raising campaigns, such as those which leverage legacy CBT and phishing simulations are not, in themselves, affording sufficient protection against cyber attacks.