Need a new search?

If you didn't find what you were looking for, try a new search!

Security & Pop-Culture: Don’t Get Catfished!

By | June 24th, 2014|Security & Pop Culture|

MTV has capitalized on the naivety of the public. Surprised? We aren’t. Social media allows people all over the country, all over the world to connect. This means that you have the ability to meet someone online this afternoon that you would have otherwise never been able to meet. While [...]

Security & Pop-Culture: Can Your Boss See Your ATTACHMENTS?

By | June 3rd, 2014|Security & Pop Culture|

"Hi, I'm the guy who reads your e-mail, and also, I love you . . . " Sound creepy? Horror movie creepy? It’s actually the premise of a (really great) romance novel. In Rainbow Rowell’s ATTACHMENTS, an IT Geek named Lincoln gets a job where he’s supposed to manually filter [...]

Top Tips to Creating Your Own Information Security Policy Training Program

By | September 28th, 2017|Launching SA Programs, Managing SA Programs, Planning SA Programs, Security Awareness Programs|

So you’ve been tasked with building a security awareness program? It’s a tough job. You’ve got to figure out how to tell people about the program, teach them the security lessons that are most important to your organization, and stay within a tiny budget. What’s even tougher is figuring out [...]

Women in Film Taking on Cyber Crime

By | March 21st, 2017|Security & Pop Culture|

March is not yet over and we’re still celebrating Women’s History Month! If you’ve been following us on Facebook or Twitter you’ve been learning about many real life women in STEM fields. Everyone we’ve highlighted has contributed to society in their own way and we want to continue [...]

What Does a Social Engineer Look Like?

By | June 22nd, 2016|Ask The Experts, Security & Pop Culture|

There is no real answer to that question; a social engineer can look like anyone, because a social engineer is just a con artist. It’s not unusual to flip on the TV and see a variety of characters on popular shows and movies employing both technical and non-technical tricks to [...]

September 2015 – Monthly Overview

By | September 30th, 2015|Free Stuff, Miscellaneous|

Whew! September flew by for us here at SAC. We largely focused on the topic of malware in our content and attended several conferences (and met some awesome infosec people), all while preparing for National Cybersecurity Awareness Month (NCSAM) and keeping up with our rigorous production schedule! In case you [...]

How to Create an Engaging SAP That Your Employees Will Love

By | June 12th, 2015|Launching SA Programs, Planning SA Programs|

Many companies make timid, awkward and ineffective attempts at teaching their staff about company security policies. This occurs because most corporate security policies are boring, unintelligible tomes. I'm dying of boredom. Ergo: No one pays attention to them. We spend a lot of time helping companies get their [...]

Verizon Data Breach Report 2018: 5 Things We Learned

By | April 26th, 2018|Security Awareness 101, Security Awareness Programs|

The Verizon Data Breach Investigation Report returns for an 11th straight year. In this edition, the study includes over 53,000 incidents and 2,216 confirmed data breaches sourced from multiple data contributors. We encourage you to download it for yourself and read it cover to cover. Please note that all statistics [...]

5 Common Cybersecurity Mistakes to Avoid in 2018

By | January 18th, 2018|Ask The Experts, Security Awareness 101, Tips and Tricks|

2017 brought new challenges for personal security, and 2018 will likely do the same. While we have little control over major data breaches as individuals, we do have control over our own personal security processes. Here are five common cybersecurity mistakes to avoid in the coming year and beyond.   [...]

Harry Potter and the Security Prophecy

By | May 4th, 2017|Security & Pop Culture, Security Awareness Programs|

What the Wizarding World Can Teach Us About Security Awareness Programs Today is Star Wars Day so you would expect us to post a Star Wars-themed security blog, but we've actually already talked about the Death Star's Single Point of Failure, major security fails throughout the original series and how [...]

Load More Posts