Insights & human risk resources
Deep dives, data, and practical resources for teams focused on reducing behaviour-driven risk.

5 min read
The 26 billion record data leak and how you should protect your data
26 billion leaked records surfaced in a 12-TB trove. Learn what it means for users and the eight actions to reduce risk, from unique passwords and MFA to phishing training and dark web monitoring.

5 min read
Overcoming MFA fatigue attacks
What is MFA fatigue and why it’s rising. See attacker tactics across email, SMS, voice, and chat, and the controls that reduce approvals and protect accounts.

5 min read
Product & Content Updates January 2024: QR Code Phishing Simulations, New Templates & Training
New in January 2024 partner update: QR Code phishing simulations and templates, new training on QR-code email risks, plus partner events and updates from the usecure platform

5 min read
The Essential Eight Explained and How to Strengthen Cyber Security
This article explains the Australian Cyber Security Centre’s Strategies to Mitigate Cyber Security Incidents, with a deep dive into the Essential Eight and the Essential Eight Maturity Model. It breaks down all five strategy categories, maps each to maturity levels, and outlines how to prioritise implementation. The post also shows how security awareness training and a policy management tool help organisations reduce human risk and operationalise the ASD’s recommendations.

5 min read
6 best practices in customer data compliance for your business
Read on to discover six best practices businesses should employ to ensure the safety of customer data and compliance with various regulations.

5 min read
The growing threat of QR code phishing and how to build employee resilience
Learn what QR code phishing (quishing) is, why attacks are surging, how criminals exploit QR codes and how to train employees with realistic QR phishing simulations.
.avif)
%20(1).png)





.avif)