Empower people, secure your business

Use our data driven tools to engage, influence and cultivate security among your colleagues. Reduce cyber risk by making everyone part of your extended security team.

Discover what our customers are saying:

The statistics leave no doubt …


of information security breaches involve some kind of human error.


Why Secure Practice? →

Secure Practice creates security champions

Learn how every employee can become a contributor to better cyber security in your organization.

Motivate a secure mindset

Facilitate an empathetic dialogue about security in your company. Build awareness through positive interactions, and get insights for further action. We offer:

  • Gamification and feedback with user experiences that people will love
  • Useful end-user tools with high visibility results for everyone

About Engage →

Provide relevant training

Offer a positive learning experience, relevant for both personal life and work. Align training with user needs to stimulate a sense of mastery. We offer:

  • Personalized progress to resonate with individual risk understanding
  • High quality content with first class support for any platform

About Influence →

Improve employee behaviors

Change comes easier when the tasks are easy, or the motivation is high. Take advantage of metrics and culture to drive human security. We offer:

  • Collaborative platform with security habits for everyone
  • Data-driven improvement with actionable feedback

About Cultivate →

Award winning products from Secure Practice:

OSPA Winner 2018 Best new security product

«Secure Practice offers a unique way for employees and companies to detect and respond to targeted email threats.»

Outstandig Security Performance Awards

Winner 2018: «Best new security product»

Developed with support from:

Phishing with Azure AD B2B Collaboration

The email has invites@microsoft.com as sender, and every technical investigation (both SPF, DKIM and DMARC) shows that the email itself has indeed been sent from Microsoft.

Read post

Secure software with OWASP ASVS

Are you working on security requirements in software development, test or procurement? There is no need to re-invent the wheel. See the talk on how OWASP Application Security Verification Standard (ASVS) can help.

Read post

Experiences with simulated phishing

Are you assessing whether simulated phishing may be a good thing to do in your company? See this video for useful steps and input to prepare and launch your own internal phishing campaign.

Read post