Insights & human risk resources

Deep dives, data, and practical resources for teams focused on reducing behaviour-driven risk.

Human Risk Intelligence

5 min read

Human Risk Intelligence (HRI): What It Is and Why It Matters

As AI threats and governance pressure grow, Human Risk Intelligence (HRI) offers a smarter way to see risk, prioritize fixes, and prove progress.

Jordan Daly

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Filters

AI Threats

5 min read

Synthetic Identities and Impersonation: How Support Desks and Finance Teams Are Being Targeted

Synthetic identity fraud and impersonation attacks are among the fastest-growing threats targeting support desks and finance operations today. Fraudsters combine stolen data with fabricated details to create convincing fake identities, then impersonate executives, vendors, or employees to bypass verification and redirect funds. In this blog, we break down the five-stage synthetic identity creation process, examine real-world attack examples, and present the latest statistics showing the global surge in synthetic fraud. You’ll discover how Human Risk Intelligence can help organizations strengthen defenses against these sophisticated schemes.

Yu Ling Lok

Compliance

5 min read

Best security training platforms for compliance (ISO 27001 / SOC 2) in 2026

Best security awareness training platforms for ISO 27001 and SOC 2 in 2026. Compare tools, features, compliance reporting, and find the right fit for your business.

Yu Ling Lok

Compliance

5 min read

Top 10 NIS2 Compliance Tools for 2026 (Compared)

The 10 best NIS2 compliance tools for 2026, compared. GRC automation, ISMS, and human risk platforms, with best-fit picks for IT teams and MSPs.

Yu Ling Lok

AI Threats

5 min read

AI-Driven Recon: Faster Targeting of C-Suite/Finance/Admins for BEC-Style Fraud

This blog explores how artificial intelligence is transforming Business Email Compromise (BEC) attacks by dramatically accelerating reconnaissance and enabling hyper-personalized targeting of C-level executives, finance teams, and system administrators. It breaks down the AI-powered attack pipeline step by step, highlight the highest-risk roles attackers focus on, present the latest statistics and explain how Human Risk Intelligence (HRI) provides a smarter, proactive defense beyond traditional security awareness training. As BEC losses continue to climb, organizations must evolve from reactive training to data-driven human risk management to stay protected.

Yu Ling Lok

AI Threats

5 min read

AI-Generated Malware & Scam Kits: Lowering The Barrier for Low-skill Attackers

AI-generated malware and scam kits are rapidly lowering the barrier to entry for cybercrime, enabling low-skill attackers to launch highly sophisticated, large-scale attacks. By leveraging tools like uncensored LLMs and Phishing-as-a-Service kits, attackers can create hyper-personalized, polymorphic phishing campaigns that bypass traditional security filters. As AI-driven threats surge in volume and effectiveness, legacy defenses are failing to keep pace. The blog highlights real-world examples and data from 2025–2026, emphasizing the urgent need for a proactive, Human Risk Intelligence (HRI) approach to strengthen the human layer and mitigate modern cyber risks.

Yu Ling Lok

Product Updates

5 min read

Product and Content Updates April 2026: Help Desk Social Engineering, MSP Proof, and more

April brings a new course on help desk social engineering, refreshed phishing content, a new MSP customer story, and platform updates focused on stronger access control, smoother admin, and better partner experience.

Kerryn Zendera

Company News

5 min read

Episode 3 of The usecure Show is live - watch now!

Episode 3 of The usecure Show is now live — bringing practical insights MSPs can use to strengthen security conversations and uncover new sales opportunities.This episode explores one core theme: human behaviour is both the biggest security risk and the biggest opportunity for MSPs.

Annie Shah

Security Awareness

5 min read

Top 10 Phishing Simulation Tools for 2026 [Complete Guide]

Phishing remains the leading cause of security breaches, making realistic simulation essential. This guide reviews the top 10 phishing simulation tools for 2026, highlighting key features, automation, reporting, and how to choose the right platform to reduce human cyber risk effectively.

Kerryn Zendera

Human Risk Intelligence

5 min read

Why Human Risk Management (HRM) Has Become a Guessing Game

Why do so many teams still struggle to act on human risk? This blog explores the gap between human risk activity and real insight, and why IT, compliance, and MSP leaders need a clearer way to prioritize action.

Jordan Daly