THE CM BLOG.

READ ON FOR THE GOOD STUFF.

Cyber Security Awareness: Role, Unicorn, or Service?

Cyber Security Awareness: Role, Unicorn, or Service?

Managing human risk is one of the top growing concerns with CISOs and business executives around the world. The role of a Security Awareness & Communications Manager as well as cyber security awareness computer based training are two key areas to increase maturity...

read more
Differences Between Free Cyber Awareness Training vs Paid

Differences Between Free Cyber Awareness Training vs Paid

One of the great quotable movie scenes of all time is the scene in the third Indiana Jones movie, Indiana Jones and the Last Crusade, where the ancient Knight guarding the Holy Grail gives a heads up to the Nazi treasure hunter and Indiana Jones to “choose wisely”. As...

read more
The Princess Bride: Security Culture Runs Deep

The Princess Bride: Security Culture Runs Deep

“Inconceivable!” In Rob Reiner’s masterpiece, The Princess Bride, Vizzini distinguishes himself by repeatedly denying that the events ultimately leading to his death are actually happening. Vizzini, (played by Shawn Wallace), is a genius with a long, distinguished...

read more
5 Cyber Security Tips for Job Seekers During COVID 19

5 Cyber Security Tips for Job Seekers During COVID 19

Losing a job is often the worst, a real cut to the heart and pocketbook alike. Cybercriminals however, don’t really care about what you are going through, and are after you anyway (heartless bastards, aye). Here are some important things to keep in mind, so you keep...

read more
Is Your Cyber Security Relationship Like Talledega Nights?

Is Your Cyber Security Relationship Like Talledega Nights?

Just as Cal’s push to outshine Ricky seemed inevitable, cyber security has tried to push its way onto the board agenda, sometimes rather awkwardly around the back of or away from the overall IT agenda. This competition for board attention has led to a few wins for CISCOs, but ultimately has created an extra obstacle for the digital transformation agenda overall.

read more
Securing Your Millennials

Securing Your Millennials

For cybersecurity awareness, behavior and culture change we think hard about how we can engage everyone to be more secure. This includes sometimes the challenging feat of bringing millennials onboard with governance and compliance around information security…

read more
COVID 19 Non Compliance

COVID 19 Non Compliance

Getting People On Board When Change Matters. (aka. Why are people breaking quarantine? & How it relates to your Digital Outliers.)There is a shocking amount of non-adherence to clear and immediate directions regarding the coronavirus pandemic. Why is that? Ah, the...

read more
The Matrix

The Matrix

The Matrix In the Wachowski’s film, The Matrix (starring Bill...or was it Ted?), the heroes of the film are betrayed by a member of their own team, Cypher (Joe Pantoliano). In perhaps one of the most prophetic scenes in any movie of recent memory, Cypher sits with the...

read more
Once Upon A Time in Hollywood

Once Upon A Time in Hollywood

A growing tide of unethical, and outright illegal, actors are trying to take advantage of us every day. This blog series will be dedicated to combining these two tools to help illuminate key issues facing us as these bad actors (see what I did there?!) try to manipulate our behaviour to serve their own, selfish, unethical purposes. Allow me to demonstrate…

read more
How Hackers are Exploiting the Coronavirus Outbreak.

How Hackers are Exploiting the Coronavirus Outbreak.

What are the Scares, Scams, Phishing, and Digital Threats to Employees from Hackers Exploiting the Coronavirus Outbreak? During natural disasters and other major events, criminally-minded people and other baddies are willing to do unethical things to make a profit....

read more
How to Protect Your Identity and Data During Tax Season

How to Protect Your Identity and Data During Tax Season

According to Carbon Black, “Research into various marketplaces on the dark web found W-2 forms, 1040 forms and how-to guides for illicitly cashing out tax returns available. W-2s and 1040s are available on the dark web at relatively low cost, ranging from $1.04 to $52. Names, Social Security Numbers (SSNs) and birthdates can be obtained for a price ranging from $0.19 to $62.

read more
PRESS RELEASE – NTE Partnership

PRESS RELEASE – NTE Partnership

PRESS RELEASE The Cybermanics is proud to announce our new partnership with NTE the UK's finest B2B online connectivity providers. For 30 years, they have stoically been connecting UK business together while being at the forefront of the cyber revolution. They know...

read more
Serious Thinking. Silly Stuff. News. Events. Ideas.