Insights & human risk resources
Deep dives, data, and practical resources for teams focused on reducing behaviour-driven risk.

5 min read
Synthetic Identities and Impersonation: How Support Desks and Finance Teams Are Being Targeted
Synthetic identity fraud and impersonation attacks are among the fastest-growing threats targeting support desks and finance operations today. Fraudsters combine stolen data with fabricated details to create convincing fake identities, then impersonate executives, vendors, or employees to bypass verification and redirect funds. In this blog, we break down the five-stage synthetic identity creation process, examine real-world attack examples, and present the latest statistics showing the global surge in synthetic fraud. You’ll discover how Human Risk Intelligence can help organizations strengthen defenses against these sophisticated schemes.
.png)
5 min read
Best security training platforms for compliance (ISO 27001 / SOC 2) in 2026
Best security awareness training platforms for ISO 27001 and SOC 2 in 2026. Compare tools, features, compliance reporting, and find the right fit for your business.

5 min read
Top 10 NIS2 Compliance Tools for 2026 (Compared)
The 10 best NIS2 compliance tools for 2026, compared. GRC automation, ISMS, and human risk platforms, with best-fit picks for IT teams and MSPs.

5 min read
AI-Driven Recon: Faster Targeting of C-Suite/Finance/Admins for BEC-Style Fraud
This blog explores how artificial intelligence is transforming Business Email Compromise (BEC) attacks by dramatically accelerating reconnaissance and enabling hyper-personalized targeting of C-level executives, finance teams, and system administrators. It breaks down the AI-powered attack pipeline step by step, highlight the highest-risk roles attackers focus on, present the latest statistics and explain how Human Risk Intelligence (HRI) provides a smarter, proactive defense beyond traditional security awareness training. As BEC losses continue to climb, organizations must evolve from reactive training to data-driven human risk management to stay protected.

5 min read
AI-Generated Malware & Scam Kits: Lowering The Barrier for Low-skill Attackers
AI-generated malware and scam kits are rapidly lowering the barrier to entry for cybercrime, enabling low-skill attackers to launch highly sophisticated, large-scale attacks. By leveraging tools like uncensored LLMs and Phishing-as-a-Service kits, attackers can create hyper-personalized, polymorphic phishing campaigns that bypass traditional security filters. As AI-driven threats surge in volume and effectiveness, legacy defenses are failing to keep pace. The blog highlights real-world examples and data from 2025–2026, emphasizing the urgent need for a proactive, Human Risk Intelligence (HRI) approach to strengthen the human layer and mitigate modern cyber risks.

5 min read
Product and Content Updates April 2026: Help Desk Social Engineering, MSP Proof, and more
April brings a new course on help desk social engineering, refreshed phishing content, a new MSP customer story, and platform updates focused on stronger access control, smoother admin, and better partner experience.
5 min read
Episode 3 of The usecure Show is live - watch now!
Episode 3 of The usecure Show is now live — bringing practical insights MSPs can use to strengthen security conversations and uncover new sales opportunities.This episode explores one core theme: human behaviour is both the biggest security risk and the biggest opportunity for MSPs.
%20(1).png)
5 min read
Top 10 Phishing Simulation Tools for 2026 [Complete Guide]
Phishing remains the leading cause of security breaches, making realistic simulation essential. This guide reviews the top 10 phishing simulation tools for 2026, highlighting key features, automation, reporting, and how to choose the right platform to reduce human cyber risk effectively.
.avif)
%20(1).png)



%20(1).png)