Home

slider-bg.png

Welcome

Welcome to the Living Security Community! Make us your home for collaborating and learning with other cybersecurity awareness professionals. Bookmark the site and visit it often. There's always something new in store for you. 

slider-bg.png

 

Community Job Board

Are you hiring OR looking for a new challenge? Tell us all about it on the Job Board

Need help?

If you can't find the Living Security product solution you're looking for, fret not, there are a lot of ways to contact Support. 

Contact Our Support Team

Join the Discussion

Living Security developed this Community to support cybersecurity leaders just like you. We realize the challenges of your role, so let's help each other by sharing what's working best in your human risk management program! 

Let's Get Talking!

Job Board 

Are you looking for a new challenge, or do you have an opening with a great opportunity in the field of cybersecurity awareness? Let's network! 

See the Job Board

Have an idea?

Do you have a suggestion to improve a Living Security product or offering? Our engineers and content teams are working tirelessly behind the scenes to make your dreams come true. We'd love to hear from you.

Submit Your Idea







Living Security Blogs

  • In the ever-evolving landscape of cybersecurity, social engineering emerges as a sophisticated form of manipulation, exploiting the most unpredictable element of security systems: the human factor. Unlike traditional cyberattacks that target system vulnerabilities through technical means, social engineering attacks focus on manipulating individuals to voluntarily compromise security protocols, revealing confidential information, or granting unauthorized access. Understanding social engineering is paramount in the digital age, where information is both the most valuable asset and the most vulnerable target. This article aims to dissect the concept of social engineering, illustrating its dangers, methodologies, and the importance of awareness and proactive measures to mitigate its risks.
  • Cybersecurity risks encompass not only rogue codes but also human vulnerabilities, emphasizing the importance of employee risk management in contemporary settings. With that in mind, the Human Risk Management (HRM) Maturity Model has emerged as a lighthouse guiding organizations to safer shores.
  • The sophistication of cyber-attacks is continually evolving, with spoofing attacks becoming a prevalent threat across various industries such as healthcare, finance, and trading. Spoofing, at its core, involves the act of masquerading as a legitimate entity, whether it be a person, organization, or device, to deceive victims and gain unauthorized access to sensitive information. The importance of understanding and preventing spoofing cannot be overstated; it is a critical step in safeguarding not only individual security but also the integrity of businesses. The potential risks and consequences of falling victim to spoofing attacks are vast, ranging from financial losses to severe reputational damage. Understanding the nuances of these attacks is essential in the modern business environment.


VIDEOS AND TRAILERS



Cybersecurity Quotables

“Education has always been a profit-enabler for individuals and the corporation. Education ... must evolve quickly and radically to keep pace with digital transition. Education is a part of the digital equation.”  ― Stephane Nappo

“If you spend more on coffee than on IT security, you will be hacked."  ― Richard Clarke

“As cyber security leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.” ― Britney Hommertzheim