Insights & human risk resources

Deep dives, data, and practical resources for teams focused on reducing behaviour-driven risk.

Human Risk Intelligence

5 min read

Human Risk Intelligence (HRI): What It Is and Why It Matters

As AI threats and governance pressure grow, Human Risk Intelligence (HRI) offers a smarter way to see risk, prioritize fixes, and prove progress.

Jordan Daly

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Filters

AI Threats

5 min read

AI-Generated Malware & Scam Kits: Lowering The Barrier for Low-skill Attackers

AI-generated malware and scam kits are rapidly lowering the barrier to entry for cybercrime, enabling low-skill attackers to launch highly sophisticated, large-scale attacks. By leveraging tools like uncensored LLMs and Phishing-as-a-Service kits, attackers can create hyper-personalized, polymorphic phishing campaigns that bypass traditional security filters. As AI-driven threats surge in volume and effectiveness, legacy defenses are failing to keep pace. The blog highlights real-world examples and data from 2025–2026, emphasizing the urgent need for a proactive, Human Risk Intelligence (HRI) approach to strengthen the human layer and mitigate modern cyber risks.

Yu Ling Lok

Product Updates

5 min read

Product and Content Updates April 2026: Help Desk Social Engineering, MSP Proof, and more

April brings a new course on help desk social engineering, refreshed phishing content, a new MSP customer story, and platform updates focused on stronger access control, smoother admin, and better partner experience.

Kerryn Zendera

Company News

5 min read

Episode 3 of The usecure Show is live - watch now!

Episode 3 of The usecure Show is now live — bringing practical insights MSPs can use to strengthen security conversations and uncover new sales opportunities.This episode explores one core theme: human behaviour is both the biggest security risk and the biggest opportunity for MSPs.

Annie Shah

Security Awareness

5 min read

Top 10 Phishing Simulation Tools for 2026 [Complete Guide]

Phishing remains the leading cause of security breaches, making realistic simulation essential. This guide reviews the top 10 phishing simulation tools for 2026, highlighting key features, automation, reporting, and how to choose the right platform to reduce human cyber risk effectively.

The usecure Team

Human Risk Intelligence

5 min read

Why Human Risk Management (HRM) Has Become a Guessing Game

Why do so many teams still struggle to act on human risk? This blog explores the gap between human risk activity and real insight, and why IT, compliance, and MSP leaders need a clearer way to prioritize action.

Jordan Daly

Human Risk Intelligence

5 min read

Human Risk Management (HRM) vs Human Risk Intelligence (HRI)

Discover how Human Risk Intelligence builds on Human Risk Management to give security leaders better visibility, prioritisation, and proof of risk reduction.

Jordan Daly

AI Threats

5 min read

GenAI Data Leakage: Employees Pasting Confidential Data into AI Tools

Generative AI tools like ChatGPT, Claude, and Copilot have rapidly become essential workplace assistants, but they introduce a serious and often invisible risk: GenAI data leakage. This blog provides a comprehensive overview of the issue. It explains what GenAI data leakage is, identifies the 8 most common types of sensitive data being exposed, and introduces Human Risk Intelligence (HRI) as a proactive solution. It outlines practical steps organizations can take to safely balance AI innovation with data protection. 

Yu Ling Lok

Company News

5 min read

usecure and Cork Cyber announce integration for uLearn and uPhish

usecure is now integrated with Cork Cyber for uLearn and uPhish.This integration connects human risk management with financial protection. It helps MSPs and IT teams strengthen resilience across the full lifecycle of a user driven security incident.

Hetty Roach

Compliance

5 min read

Beyond Essentials: How usecure helps MSPs unlock CyberCert Bronze, Silver & Gold for SMB clients

Most SMB security programs start (and often stop) with the technical essentials: perimeter controls, secure configuration, access management, malware protection, and patching. Those controls are critical — and MSPs are best-placed to implement them — but they rarely provide the behaviour change and evidence trail needed to reliably pass audits, satisfy supply-chain buyers, and move to the next level.

Hetty Roach