Read articles about security awareness, risk management, behavior change, and more
How quishing is being used in attacks, what these threats look like in the wild and best practices for avoiding them.
A breakdown of the best security awareness training and compare top security awareness training vendors based on real reviews, not marketing claims.
At Hoxhunt, we’ve spent years redesigning what effective security awareness training should look like. Here's what we've found works.
A deep dive on real reported invoice fraud emails. Learn how to protect your business from invoice fraud with 9 simple steps to identify fake invoices.
Here's how to change the narrative around cybersecurity to get employees engaged.
Your ultimate breakdown on how effective security awareness training really is and why traditional compliance programs fall short.
How do you achieve cybersecurity behavior change? A breakdown of how science-based training transforms awareness into real-world risk reduction.
Your essential guide to building a robust security culture. How to implement effective training, policies, and recognition systems to mitigate human cyber risk.
The essential security awareness topics that truly change employee behavior and how Hoxhunt blends behavioral science, real-world simulations, and adaptive learning to boost engagement.
With Hoxhunt, on average more than 60% of employees are engaged in the training after just one year. But some organizations manage to push past 85%, even into the 90s. What's their secret?
Traditionally, finance has been responsible for reducing business risk. CFOs need to cooperate with IT leadership to mitigate risk from cyber attacks.
Smartphones could be a cyber threat for your company for several reasons. Learn what you should teach them about safe smartphone habits to prevent a breach.
Build a winning business case to gain leadership support so that you can invest in people-first phishing training. Learn now.
Understanding how and why people make errors is the first step to planning on how to address and eliminate human risk. Learn more about human risk.
Failing to provide security training to remote employees can leave your company vunerable to cyberattacks that have been increasing recently.
Learn how behavior-based cyber security training drives lasting employee behavior change. A breakdown of the key components, benefits, and why it’s essential for building a strong security culture.
Discover how Hoxhunt outperforms competitors in cybersecurity training. Based on real reviews, compare Hoxhunt's features, quality, and effectiveness to leading alternatives.
Empower your team to be a human firewall. Discover how training, vigilance, and smart habits protect against cyber threats.
Here's how integrating Yu-kai Chou's Octalysis Gamification and Behavioral Design Framework into cybersecurity training can dramatically improve user engagement and resilience.
Ever received an unexpected invoice? It's a harrowing feeling. Here's how to check to make sure you're not being scammed.
Unfamiliar with pretexting? It's one highly effective way for hackers to gain information from you.
Common misconceptions can lead to misunderstandings. Here's what you need to know now!
For about the price of an inexpensive dinner for two, anyone can compromise your identity.
Innocuous-looking surveys and research requests are becoming an increasingly popular way for bad actors to break through security protocols.
Learn how to tell if someone is who they say they are online
We train our users to always hover over links in emails and to validate the domain where the links points to. This can’t be trusted if you are using Microsoft Edge to view your emails in Office 365.
Your ultimate guide to the process behind social engineering training and all of the tips and know-how you need to ensure your training successfully changes behavior.
From Spear-Phishing, to Credential Harvesting, To Possible Ad Fraud. Keep Reading To Find Out How This Story Unfolded and How You Can Avoid Getting Caught.
We're seeing an uptick in social engineers targeting social media accounts
Now that cookies are on their way out, a much sneakier way of identifying you is on its way in.
Years later, pop-ups are back, this time serving a different purpose... stealing your info.
The more digital money you make, the more digital problems you get. Here's some tips to keep your crypto wallet safe.