Welcome to the CybeReady’s Blog

The latest and greatest insights, guides, and best practices for perfecting your employee security awareness training
Rene Leimegger, Alpega Group
image April 21, 2021 image 2 MIN READ
Rene Leimegger has been working in the cybersecurity space for over 10 years. He held Service Management and Internal Applications[...]
Text-based Training Beats Video Training Any Day
image March 21, 2021 image 4 MIN READ
There’s a rumor going around that people learn better or engage better with video content over text-based content. It’s easy[...]
Hi-5 with a CISO - Ian Parker
image March 20, 2021 image 2 MIN READ
Ian Parker has been working in the cybersecurity space for over 20 years. He held security information management roles in[...]
Is Spear Phishing Employees an Effective Training Technique?
image March 19, 2021 image 3 MIN READ
There is a common mistake in security awareness training, where teams spend time creating complex and sophisticated phishing simulations that[...]
High-risk Employees
image March 18, 2021 image 4 MIN READ
Let's try to visualize a high-risk employee. What do you see? We all know some employees are considered more high-risk[...]
How should I report Progress of my Security Awareness Training to the C-suite?
image March 17, 2021 image 3 MIN READ
We’ve talked before about measuring progress rather than sheer participation to prove the worth of your security awareness training. Here’s[...]
Click rate
image March 16, 2021 image 4 MIN READ
How do I know if my security awareness training is working? This is one of the most common questions that[...]
Hen Ron SodaStream
image March 15, 2021 image 2 MIN READ
Hen Ron has been working in the cybersecurity space for the last 10 years. He held IT infrastructure and IT[...]
You want your employees to engage with your content
image March 11, 2021 image 5 MIN READ
How Can I Get Employees to Engage with Security Content? How do you know if your security awareness training is[...]
Cyber Awareness Training
image March 09, 2021 image 4 MIN READ
Often when customers approach us, their existing security awareness training is spread very thinly. It’s trying to cover it all[...]
Lesley Marjoribanks MG
image March 08, 2021 image 2 MIN READ
Lesley Marjoribanks has been working in the cybersecurity ecosystem for the last 12 years. She held Customer Security and Security[...]
Understanding the Impact of Automated Clicks on Phishing Simulation Training
image February 21, 2021 image 6 MIN READ
Automated clicks are the outcome of security tools used by security teams to check and validate the status of email[...]
Hi5 with Security Awareness Lead - Ceri Jones
image February 14, 2021 image 3 MIN READ
Ceri Jones has studied and worked in security for a little over 10 years and been in her current role[...]
image February 09, 2021 image 3 MIN READ
Voice Phishing, also known as ‘vishing’, is a growing form of attack, with 83% of organizations reporting it as a[...]
Hi-5 with a CISO Dalibor Kovacevic
image February 01, 2021 image 3 MIN READ
Dalibor Kovacevic has been working in the cybersecurity space for about eight years. He held security consulting and IT audit[...]
image January 20, 2021 image 4 MIN READ
In 2003, a Swiss tennis player named Roger Federer won his first grand slam title – the prestigious Wimbledon championship. Federer has[...]
image January 12, 2021 image 2 MIN READ
Gil Polak has been with the Bank of Israel since 1999. He started working there over 22 years ago as[...]
banking regulations
image January 11, 2021 image 4 MIN READ
2020 brought with it an alarming level of cyber threat against banks, which spurred government officials to call for new[...]
Hi-5 with a CISO
image December 22, 2020 image 2 MIN READ
Ilan Abadi has been working in Cybersecurity for 25 years - including CISO roles in Ness Technologies and the Israeli[...]
Awareness Training
image December 13, 2020 image 3 MIN READ
Employees Face the Brunt of Cyber Attacks In the security awareness training world, frontline employees are viewed to be wearing[...]
Sign up for our newsletter to find great value in your inbox

    By submitting this request, you agree to our Privacy Policy.

    image Post of the month
    It seems like every time a new COVID-19 strain hits the headlines, a new wave of cyberattacks follows in its wake.