Cyber Security Articles & News

6 Types of Social Engineering Attacks

Social engineering attacks account for a massive portion of all cyber attacks. Since COVID-19, these attacks are on the rise. More than 90% of successful hacks and data breaches start with social engineering. 

Read More >
4 Key Benefits of Multi-Factor Authentication (MFA)

In today’s world, using single-factor authentication (SFA) such as a lone password or a PIN number to access private data may no longer cut it. With the rise of cyber security threats — including an increasing number of ransomware attacks — it may be time to explore steps you can take to level up your organization’s cybersecurity.

Read More »
Why Should You Invest in KnowBe4's Kevin Mitnick Security Awareness Training?

Data breaches are one of the most common cyber security incidents that can cost companies millions, even trillions of dollars.

Read More »
5 Holiday Cybersecurity Tips To Prepare Your Organization

Protecting your organization from outside threats should always be a top priority. However, you may need to shore up your security as we approach the holiday season. The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) report an increase in devastating ransomware attacks during the holidays — when offices are normally closed. Below, we’ll discuss the 5 cybersecurity tips to protect your data during this vulnerable time. 

Read More »
Spear Phishing vs Phishing: Recognizing the Difference

Since the dawn of the internet, there have been threat actors looking to exploit systems, steal data, and compromise the integrity and reputation of people and the organizations they serve. Although there are many types of cyber attacks, phishing accounts for around 25% of all data breaches. 

Read More »
Kevin Mitnick Security Awareness Training: Microsoft Teams

Kevin Mitnick — founder of Mitnick Security and KnowBe4’s Chief Hacking Officer — helps organizations find and remediate vulnerabilities through penetration testing to avoid cybersecurity incidents. However, that isn’t the whole story. 

Read More »
What is a Red Hat Hacker? Top Things to Know

Cyber attackers shouldn’t all be painted with the same brush. There are many different types, all with separate motivations and tactics for launching their attacks.

Read More »
World Famous Computer Hackers and What They're Doing Now

We can agree that one thing all hackers share is curiosity, but not all hackers are the same. There are different types of hackers. For example, black hat hackers (threat actors) exploit network vulnerabilities and attempt to make a profit to the detriment of businesses. These are the “bad guys” of the hacking world.

Read More »
Vulnerability Assessment vs Penetration Testing: Key Differences

While similar in some ways, the often interchangeably used vulnerability assessments and penetration tests are two different beasts. Throw vulnerability scans into the mix and, suddenly, most companies are confused.

Read More »
Uber Data Breach: What To Know About the 2022 Cybersecurity Attack

No matter how robust network security is, even the biggest companies fall victim to cyber attacks. These malicious attacks can be costly — to the tune of 4.3 million on average — but they also disrupt operations and hurt a company’s reputation. 

Read More »