Insights & human risk resources

Deep dives, data, and practical resources for teams focused on reducing behaviour-driven risk.

Human Risk Intelligence

5 min read

Human Risk Intelligence (HRI): What It Is and Why It Matters

As AI threats and governance pressure grow, Human Risk Intelligence (HRI) offers a smarter way to see risk, prioritize fixes, and prove progress.

Jordan Daly

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Filters

Simulated Phishing

5 min read

How Hacker's Use Social Media For Social Engineering Attacks

Social media has now become a gold mine for online hackers, with easily-accessible sensitive and personal data - perfect for social engineering.

Emma Woods

Simulated Phishing

5 min read

The Real Reason Phishing Attacks Are So Successful

Phishing emails keep working because of low user awareness, weak controls and cheap attack tools. Discover six core reasons these scams succeed and how to fight back.

Emma Woods

Simulated Phishing

5 min read

The Real Reason For Successful Phishing Attacks

Successful phishing attacks are increasing at a rapid rate, and so too are the variety of forms they come in. Why do they continue to be so successful?

Emma Woods

Simulated Phishing

5 min read

The Three Stages Of a Phishing Attack - Bait, Hook And Catch

We've all heard of phishing and how damaging a successful attack can be. But what are the three stages of a phishing attack?

Emma Woods

Simulated Phishing

5 min read

The most common examples of phishing emails

Get to know the 9 most common examples of phishing emails. Help your staff to spot the less obvious signs in highly sophisticated phishing emails.

Emma Woods

Simulated Phishing

5 min read

The 5 Types Of Employees Phishing Emails Love To Target

From manufacturing to health care, all industries are targets for cyber attacks. Read this article to learn what types of employees are most vulnerable.

Emma Woods

Enablement

5 min read

Phishing Simulations MSPs Can Deploy Today

Quarterly phishing roundup for MSPs: localized AU scams, delivery and MFA lures, BEC/compliance impersonation—plus upcoming AI safety and identity training. Deploy fast with AutoPhish to reveal risk and lift resilience.

Kerryn Zendera

Enablement

5 min read

The Mentor Group's Journey to ISO Compliance with usecure

Mentor Group’s ISO 27001 audit praised usecure as “best and most comprehensive.” Results: +34% user scores, –29% phishing compromises, 94% completion with bite-size training and automated simulations.

Kerryn Zendera

Company News

5 min read

Introducing usecure's New Chief Product Officer: Kris Zentek

usecure welcomes Kris Zentek as Chief Product Officer. With 20+ years in cybersecurity product leadership, Kris will accelerate innovation, deepen partner alignment, and advance Human Risk Management for channel-led growth.

The usecure Team