Subscribers Receive 20 New Articles Every Month

In the sample content below you’ll see a blend of personal and business focused articles – a key part of our content strategy.  You’ll also see a wide variety of article types and security topics – also part of our content strategy. 

If you read a few you’ll notice the carefully crafted teasers, headlines and calls to action – yep, you guessed it, content strategyAnd lastly you’ll pick up on the fact that our writing style is non technical, friendly and concise. Our content strategy is designed to help you get real engagement with your audience. 

5 Things Crooks Love to See  In Your Social Media Profile

5 Things Crooks Love to See In Your Social Media Profile

Want to make an identity thief, spy, or burglar happy? Hand them all sorts of personally identifiable info in your Facebook or Instagram profile. Here are some tips from the experts...
FAQ: Security and the Cloud

FAQ: Security and the Cloud

Over the past few years, you’ve probably heard or read about “the cloud”—but do you know what it is, and how it may affect your work life?  We’ll answer some frequently asked questions about this tech trend impacting just about every industry... 
The Ransomware Perfect Storm

The Ransomware Perfect Storm

A new report warns that the “perfect storm” of conditions have come together and allowed ransomware attacks to run rampant against organizations around the world. The good news is that the average employee can easily help in the fight. Find out how....
Children More at Risk Online  During Pandemic

Children More at Risk Online During Pandemic

With kids spending even more time online now, experts say criminals who prey on children have found new opportunities. What you should be doing…
Going Back to the Office? You're a Perfect Target for Phishers

Going Back to the Office? You're a Perfect Target for Phishers

Employees returning to the office can expect cyber crooks to impersonate their colleagues and company executives. Judging by earlier campaigns, attackers will hit you with emails made to look like they’re coming from HR or possibly from the CEO. Here are some of the likely lures they’ll be using…
5 New Social Engineering Tactics Criminals Are Using Right Now

5 New Social Engineering Tactics Criminals Are Using Right Now

Pandemic panic, desperation as income concerns grow and worry over health and wellness have all made it easier for criminals to tap into fear via social engineering attacks. Deepfake video is on the list, see the rest..
April Scam Watch

April Scam Watch

Here are some of the latest ripoffs to watch out for—we’ve got your back! Zoom, dating apps, voice phishing, Linked-In. See what's coming your way....
Top 4 Emotions Used in Social Engineering

Top 4 Emotions Used in Social Engineering

Hackers use emotions as a social engineering tool to persuade their victims to take an action they normally would not.  Protect yourself by becoming familiar with the techniques used...
Security Is Critical to Pandemic Recovery

Security Is Critical to Pandemic Recovery

Privacy and security are more than a compliance issue. Businesses now view them as mission-critical priorities.
Using Instagram Securely

Using Instagram Securely

Learn the security do's and don'ts of this popular social app...
Cyber-Bullying: Tips to Pass on to Your Kids

Cyber-Bullying: Tips to Pass on to Your Kids

With many school buildings still shut down, experts say children are more vulnerable online than ever. After all, the vast majority of their contact with peers is virtual....
The Offline Threat – 5 Old-School Attacks

The Offline Threat – 5 Old-School Attacks

We get so focused on cyberattack these days that it’s easy to forget how many risks to your personal info take place in the real world....
Anatomy of a Phishing Scam

Anatomy of a Phishing Scam

Recently some hackers grew sloppy and exposed their tactics and results of a major phishing campaign....
10 Tips: Protect Seniors from Online Fraud

10 Tips: Protect Seniors from Online Fraud

Millions of our aging senior population fall prey to scams, fraud, and identity theft every year. Because older adults are more trusting and often are open to chatting with others because of isolation, they’re more vulnerable to scammers....
Data Breaches: A Ticking Time Bomb for Consumers

Data Breaches: A Ticking Time Bomb for Consumers

The impact of corporate breaches is becoming more widespread than ever, with ramifications spreading far beyond victimized companies to hit consumers and their families—often months or years later....
Rethinking Passwords in the ‘Brute Force’ Age

Rethinking Passwords in the ‘Brute Force’ Age

Here’s a discomfiting thought: Experts say that even if you create a solid password with numerals and special characters, it can be cracked in eight hours....
The 7 Key Categories of Threat Actors

The 7 Key Categories of Threat Actors

In cybersecurity, the term “threat actor” might refer to lone agents, organized criminal groups, or entire entities seeking to impact your personal security or that of your employer. To understand these actors, let’s break them down by group...
4 Things Your Home Office Needs

4 Things Your Home Office Needs

Whether you’re a longtime work-at-home veteran or a COVID newbie, here are some key elements of a secure home office...
Starbucks Safety: Security Tips for Public Computing

Starbucks Safety: Security Tips for Public Computing

Millions of workers, cooped up at home for nearly a year, are taking every opportunity to escape the house. Take a couple precautions with you...
Data Security: Myth vs. Reality

Data Security: Myth vs. Reality

In today’s world it seems people read and hear only what they already believe—even when it comes to security. How else to explain all the misconceptions employees have about security?
Are You Keeping Your CISO Up At Night?

Are You Keeping Your CISO Up At Night?

You probably don't think about it too much. Why would you? You have your own job to worry about. But there are a couple of real easy things you can do to help your security team sleep better at night, so why not check'em out?
Protect Yourself: 5 Signs of a Phone Hack

Protect Yourself: 5 Signs of a Phone Hack

Mobile threats have evolved rapidly and they're more sophisticated than ever before. Watch for these signs that you've been hacked...
Insider Threat: Former VP Goes Rogue

Insider Threat: Former VP Goes Rogue

A former vice president of a Georgia company was recently put behind bars for wreaking havoc and sabotaging systems using bogus credentials after he was fired...
4 Emerging Fraud Threats

4 Emerging Fraud Threats

Fake faces made with AI might be the scariest. Experts are warning businesses and consumers to beware of 2021’s emerging cyber-threats.  Check them out...
5 Ways COVID Will Change Cybersecurity

5 Ways COVID Will Change Cybersecurity

This year’s big story won’t be the disease, but the vaccine—it will touch nearly every facet of our lives. Here are some ways COVID-19 and its vaccines will cause cybersecurity to change in 2021...
Top Tips: Improve IoT Security  in Your Smart Home

Top Tips: Improve IoT Security in Your Smart Home

Interested in smart home automation but concerned about the risks? Fear not! Follow these tips from the pros to do it safely...
When Is Your Phone Too Old to Be Secure?

When Is Your Phone Too Old to Be Secure?

Many folks take pride in milking a few extra years out of their phones—but doing so can put them at risk. So how old is too old?
Poor Security Habits Might Start Limiting Work From Home Opportunities

Poor Security Habits Might Start Limiting Work From Home Opportunities

Work from home could be in jeopardy after it's safe to return to the office...
5 Password Tips – Never Forget the Basics

5 Password Tips – Never Forget the Basics

Someday we’ll do all our authenticating via fingerprint or 2FA, say experts. But until then, take a quick look at these 5 tips that will protect you from cybercriminals...
The Growing Ransomware Wave

The Growing Ransomware Wave

What's keeping business leaders up at night these days? Ransomware is an extortion technique that's rapidly accelerating as weapon of choice among cybercriminals. See what's coming...
The Inside Threat: Watch Out for These 3 People

The Inside Threat: Watch Out for These 3 People

Innocently or with malicious intent, one of the ways criminals get access to a company's data and networks is through the actions of company insiders. Here's how to recognize them...
Think Twice Before Tweeting About a Data Breach

Think Twice Before Tweeting About a Data Breach

Rushing to let the world know about a data breach where your info may have been compromised can make things much worse for you. Here are some people who learned it the hard way...
How to Spot Phishing Emails:  4 tips

How to Spot Phishing Emails: 4 tips

It's a truth cybercriminals bank on. When we get an email from a person or organization we think we recognize, most of us open it without a second thought. So how can we spot a trick? See 4 quick ways...
At Home Workers Put Data at Risk During Covid-19

At Home Workers Put Data at Risk During Covid-19

At-home workers may be innocently putting their company's data & networks at risk. See below to find out if you're making these 2 common mistakes.
Stop Your Personal Data From Being Sold on the Dark Web

Stop Your Personal Data From Being Sold on the Dark Web

Every wonder how much your stuff would go for on the dark web? Take a look...
Covid Pushes Cybercrime Through the Roof

Covid Pushes Cybercrime Through the Roof

Cybercriminals are using content, messaging and news related to coronavirus and Covid to lure you into falling for email and social engineering schemes at home and work. And it's getting worse...
How Much Could a Data Breach Cost the Company?

How Much Could a Data Breach Cost the Company?

No wonder cyber security is such a high priority for your company! The average cost of a data breach is a cool $4M. What about your company...
Watch Out for 'Back to Work' Memos

Watch Out for 'Back to Work' Memos

Is your HR department circulating memos telling staff that it's time to come back into the office? Scammers are using a new phishing scam to steal employee credentials. Here's how it works...
How a Chinese Agent Used LinkedIn to Spy on U.S. Companies

How a Chinese Agent Used LinkedIn to Spy on U.S. Companies

No wonder LinkedIn is one of the few western social media sites not blocked in China! Checkout this story...
The 20 Worst Passwords of 2020

The 20 Worst Passwords of 2020

Our favorite is #18. Who's Aaron? And why Aaron? Check out the very  worst passwords of 2020... 

Plenty of Great Content at Your Fingertips

12 Different Types of Articles

People respond to different types of articles. We provide you with a variety. Human interest, news bites, primers on a concept, how to, mini case studies, examples of epic security fails, top 10’s, FAQs, trends, analyst findings, water cooler anecdotes, 
what to do when, industry spotlights and more 

The Content is Easy to Use

Whether you plan to use our newsletter as the cornerstone of your program or leverage the steady supply of content to support your larger training and education program, SecuritySense makes your work easier. 

See the multiple ways you can leverage our content 

Relatable Content

When you also provide your employees with information that helps them protect themselves from cybercrime, theft and fraud your whole program becomes a lot more relevant to them. 

It’s a very effective way to get your audience to pay attention and engage

Written to Draw Them In 

Headlines, images and intro teasers all come together to invite a quick look.

The friendly, non technical voice and the easy to read content ensures they’ll look again next time because you didn’t waste their time. 

All Security Topics Covered

You’ll always have plenty of content to match with your themes or areas of special emphasis. 

We cover a variety of cyber, information and even physical security topics, with an emphasis on cyber. We provide you 20 articles and stories each month.

Reinforce Other Training

If you conduct employee training it might be periodic and can often feel a little academic to the trainee.

Reinforce those principles and concepts with an engaging promotional approach that’s always on and doesn’t feel like work to read.

As they engage with our real life content your employees will make connections back to your training principles

Attractive Pricing for
Any Size Organization

People who practice good security habits at home bring those habits to work. Which is why we appreciate the mix of company focused and home focused content in SecuritySense. Our employees tell me all the time they look forward to reading the SecuritySense articles. It gets our employees engaged and supports our overall cybersecurity training and education program.
SEAN LESPERANCE
Security Education and Data Analyst, MIT Lincoln Laboratory

Put SecuritySense to
Work for You Today!

Just pennies per employee…

We've been sharing SecuritySense content monthly to our employees for over 5 years. We love that it has security information that can help our employees in their personal lives as well as at work. We know that providing security awareness to employees for their personal use carries over to their work life. We highly recommend Security Sense.
SARA HEDRICH, CISSP
Industrial Security, Spirit AeroSystems