Security Awareness Blog: Author - lspitzner

OUCH! is out - Encryption

The August edition of OUCH! has been released. For this month we focus on encryption. Far too often we tell people to use encryption to protect themselves and their information, but we do not explain what encryption is, why they should use it or how. Chris Crowley is our Guest Editor for this month and … Continue reading OUCH! is out - Encryption


Guest Post - Measuring Human Risk - #SecAwareSummit

Editor's Note: This is a guest Blog Post from Dan deBeaubien. Below is a description of his upcoming talk on "Measuring Human Risk - What is Your Security Score" at theSecurity Awareness Summit 10 Sep in Dallas. Assuming that we know what to do in a given circumstance related to cyber security - install a … Continue reading Guest Post - Measuring Human Risk - #SecAwareSummit


The Hardest Part in Awareness - Deciding What NOT To Teach

There are many challenges to implementing an effective awareness program, challenges from gaining management support and effective communication to selecting your metrics and measuring your impact. However one of the biggest challenges I run into, and one that surprises most people, is deciding what topics or learning objectives NOT to cover. Think about it, you … Continue reading The Hardest Part in Awareness - Deciding What NOT To Teach


Guest Post - Selling Enthusiasm - #SecAwareSummit

Editor's Note: This is a guest Blog Post from Matt Beland, the Chief Security Officer at the law firm Davis Wright Tremaine LLP. Below is a description of his upcoming talk on "Selling Enthusiasm" at the Security Awareness Summit 10 Sep in Dallas. Everyone's familiar with the old saying - "There are three things … Continue reading Guest Post - Selling Enthusiasm - #SecAwareSummit


Just Released - The Phishing Planning Kit

One of the biggest challenges with an effective phishing program is not the technology you use, but how you communicate and implement your phishing program. To assist you in getting the most out of your phishing program we have put together the Phishing Planning Kit. Based on the feedback and input of numerous security … Continue reading Just Released - The Phishing Planning Kit