Welcome to the Living Security Community! Make us your home for collaborating and learning with other cybersecurity awareness professionals. Bookmark the site and visit it often. There's always something new in store for you. 



Community Job Board

Are you hiring OR looking for a new challenge? Tell us all about it on the Job Board

Need help?

If you can't find the Living Security product solution you're looking for, fret not, there are a lot of ways to contact Support. 

Contact Our Support Team

Join the Discussion

Living Security developed this Community to support cybersecurity leaders just like you. We realize the challenges of your role, so let's help each other by sharing what's working best in your human risk management program! 

Let's Get Talking!

Job Board 

Are you looking for a new challenge, or do you have an opening with a great opportunity in the field of cybersecurity awareness? Let's network! 

See the Job Board

Have an idea?

Do you have a suggestion to improve a Living Security product or offering? Our engineers and content teams are working tirelessly behind the scenes to make your dreams come true. We'd love to hear from you.

Submit Your Idea

Living Security Blogs

  • Insider Threat Awareness Tools & Resources In today's digital landscape, insider threats have become a growing concern for organizations of all sizes. As businesses increasingly rely on technology and digital assets, the risk of sensitive data and systems being compromised by insiders has never been higher. It is crucial for organizations to pay attention to these risks and take proactive measures to safeguard against these threats, including targeted attacks and ransomware. This guide will cover essential aspects of insider threat awareness, including understanding the nature of insider threats, leveraging tools for detection and prevention, and accessing valuable resources for awareness training. By implementing the strategies and best practices outlined in this guide, organizations can significantly enhance their resilience against insider threats and protect their critical assets from internal risks.
  • What is a Phishing Campaign? How Do You Create One? Phishing campaigns have become an increasingly common and dangerous threat to businesses and individuals. These malicious attacks can result in data breaches, financial losses, and compromised personal information. As cybercriminals continue to refine their techniques, it's crucial to understand how phishing campaigns work and learn how to create your own for educational and testing purposes. In this comprehensive guide, we'll explore the ways phishing campaigns typically operate, providing you with ideas, phishing campaign examples, and phishing simulations to help you better understand and defend against these threats.
  • We're thrilled to announce that Ashley Rose, the CEO of Living Security, has been honored with the prestigious first-time founder award by the Austin Technology Council. This recognition is a testament to Ashley's outstanding leadership and the incredible journey of Living Security.


Cybersecurity Quotables

“Education has always been a profit-enabler for individuals and the corporation. Education ... must evolve quickly and radically to keep pace with digital transition. Education is a part of the digital equation.”  ― Stephane Nappo

“If you spend more on coffee than on IT security, you will be hacked."  ― Richard Clarke

“As cyber security leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.” ― Britney Hommertzheim