<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
      
         <title> Secure Practice · Blog</title>
         <link>https://securepractice.co/blog</link>
         <atom:link href="https://securepractice.co/feed" rel="self" type="application/rss+xml" />
         <description>
    
        
            
        
    

</description>
      
      <language>en-US</language>
      <lastBuildDate>Thu, 23 Apr 2026 18:13:12 +0000</lastBuildDate>
      
        <item>
            <title>How to create the foundation for a strong security behavior and culture program</title>
            <link>https://securepractice.co/blog/security-behavior-and-culture-program</link>
            <guid isPermaLink="true">https://securepractice.co/blog/security-behavior-and-culture-program</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL2Jsb2cvMjYwMjIzLWN5YmVyc2VjdXJpdHktZXhlcmNpc2UuanBlZw/260223-cybersecurity-exercise.jpeg?w=1200&h=900&fit=crop&s=4badf8e118446b3bbbb9a0fef4845e17"/><p>Discover how to design a security behavior and culture program that balances people, processes, and technology for long-term resilience.</p><a href="https://securepractice.co/blog/security-behavior-and-culture-program" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 23 Feb 2026 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>When CEOs fall for phishing attacks: what it teaches us about human risk</title>
            <link>https://securepractice.co/blog/ceo-phishing-attack</link>
            <guid isPermaLink="true">https://securepractice.co/blog/ceo-phishing-attack</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3RlYW0vX2RzYzg2NDQuanBn/_dsc8644.jpg?w=1200&h=900&fit=crop&s=913c19123ea162645af02fe3230c3100"/><p>Even experienced leaders can fall for phishing. Discover what CEO phishing attacks reveal about human psychology, why traditional training fails, and how smarter security tools help.</p><a href="https://securepractice.co/blog/ceo-phishing-attack" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 17 Nov 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Smarter, not harder: how to scale security awareness with a small team</title>
            <link>https://securepractice.co/blog/small-security-teams</link>
            <guid isPermaLink="true">https://securepractice.co/blog/small-security-teams</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3RlYW0vMTY3OC5qcGc/1678.jpg?w=1200&h=900&fit=crop-99-48-1&s=a89647c326ae7a9d80246f81eb2ba344"/><p>Small security awareness teams can do more with less. Learn practical ways to automate, gamify, and focus your awareness efforts for real cultural impact.</p><a href="https://securepractice.co/blog/small-security-teams" rel="nofollow">Read more</a>]]></description>
            <pubDate>Wed, 12 Nov 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Why annual cyber attack simulation exercises don’t work (and what to do instead)</title>
            <link>https://securepractice.co/blog/annual-cyber-attack-simulation-exercises</link>
            <guid isPermaLink="true">https://securepractice.co/blog/annual-cyber-attack-simulation-exercises</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL2Jsb2cvMjUxMDIyLXNlY3VyZS1wcmFjdGljZS1jeWJlci1wcmVwYXJlZG5lc3MtZXhlcmNpc2UuanBlZw/251022-secure-practice-cyber-preparedness-exercise.jpeg?w=1200&h=900&fit=crop&s=ebc3e3e48630f28341dc1943543d7b9b"/><p>One yearly cyber attack simulation exercise won’t prepare your team. Learn how to balance ongoing security training with realistic exercises, and how to make both easier to plan and repeat.</p><a href="https://securepractice.co/blog/annual-cyber-attack-simulation-exercises" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 24 Oct 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>The missing link: why phishing defense keeps failing</title>
            <link>https://securepractice.co/blog/phishing-defense</link>
            <guid isPermaLink="true">https://securepractice.co/blog/phishing-defense</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL2Jsb2ctY292ZXJzLzI1MTAyMy1waGlzaGluZy1jb3Zlci5qcGc/251023-phishing-cover.jpg?w=1200&h=900&fit=crop&s=960cda430916ebf23f80cbd914825884"/><p>Effective phishing defense starts with support, empathy, and tools that work for people. See how MailRisk bridges the gap between doubt and decision.</p><a href="https://securepractice.co/blog/phishing-defense" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 24 Oct 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>The Secure Practice guide to keeping your small business secure</title>
            <link>https://securepractice.co/blog/small-business-cyber-security</link>
            <guid isPermaLink="true">https://securepractice.co/blog/small-business-cyber-security</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL2Jsb2cvMjUxMDIyLTItaGVsZS1ub3JnZS1vdmVyLmpwZWc/251022-2-hele-norge-over.jpeg?w=1200&h=900&fit=crop&s=d2604e4b81ffe44d0e8517aa9af2b480"/><p>Discover simple, people-first steps to strengthen small business cyber security. Learn how tools like MailRisk, PrepJam, and Human Risk Metrics help your team handle phishing, rehearse incidents, and build safer habits.</p><a href="https://securepractice.co/blog/small-business-cyber-security" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 24 Oct 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>The Secure Practice playbook for cybersecurity training for managers</title>
            <link>https://securepractice.co/blog/the-secure-practice-playbook-for-cybersecurity-training-for-managers</link>
            <guid isPermaLink="true">https://securepractice.co/blog/the-secure-practice-playbook-for-cybersecurity-training-for-managers</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL19kc2M4MzYwLmpwZw/_dsc8360.jpg?w=1200&h=900&fit=crop&s=f5afd0f1c8739ba9086c81fdf6497778"/><p>Managers are the missing link in security culture. Explore Secure Practice’s playbook for cyber security training for managers, with practical steps and lessons.</p><a href="https://securepractice.co/blog/the-secure-practice-playbook-for-cybersecurity-training-for-managers" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 22 Sep 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>3 cybersecurity exercises that work (even if you’re low on time or budget)</title>
            <link>https://securepractice.co/blog/3-cybersecurity-exercises-examples</link>
            <guid isPermaLink="true">https://securepractice.co/blog/3-cybersecurity-exercises-examples</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9tb2JpbGUtYXNzaXN0YW5jZS5qcGc/mobile-assistance.jpg?w=1200&h=900&fit=crop&s=1150004ad163570e238c35d382fa607e"/><p>Cybersecurity exercises help teams build muscle memory, so when the real threats come, people know how to respond. And just like everything worthwhile, they’re not easy to implement.</p><a href="https://securepractice.co/blog/3-cybersecurity-exercises-examples" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 15 Aug 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>3 marketing lessons that make cyber security hands-on training more effective</title>
            <link>https://securepractice.co/blog/hands-on-cybersecurity-training</link>
            <guid isPermaLink="true">https://securepractice.co/blog/hands-on-cybersecurity-training</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy8xLWhlbGUtbm9yZ2Utb3Zlcl8xLmpwZw/1-hele-norge-over_1.jpg?w=1200&h=900&fit=crop&s=3da501aee2de721c2745c6729b7f13e5"/><p>Most people don’t wake up thinking about cybersecurity. And even when they’re required to learn about it, they often forget what they’ve been taught the moment the training ends.</p><a href="https://securepractice.co/blog/hands-on-cybersecurity-training" rel="nofollow">Read more</a>]]></description>
            <pubDate>Wed, 13 Aug 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>The next evolution of security awareness: personalized, predictive, and AI-driven</title>
            <link>https://securepractice.co/blog/ai-security-awareness</link>
            <guid isPermaLink="true">https://securepractice.co/blog/ai-security-awareness</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9xci1zY2FuLmpwZw/qr-scan.jpg?w=1200&h=900&fit=crop&s=471cc98a994fbad64e0513602cf30b98"/><p>Are AI assistants reshaping security training? Learn why personalized, behavior-based coaching is the future of security awareness.</p><a href="https://securepractice.co/blog/ai-security-awareness" rel="nofollow">Read more</a>]]></description>
            <pubDate>Wed, 25 Jun 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>5 security habits we no longer teach (and what we do instead)</title>
            <link>https://securepractice.co/blog/security-training-evolution</link>
            <guid isPermaLink="true">https://securepractice.co/blog/security-training-evolution</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy8yNy1oZWxlLW5vcmdlLW92ZXJfMjcuanBn/27-hele-norge-over_27.jpg?w=1200&h=900&fit=crop&s=450bc345158f7e9991531b6e35440306"/><p>See how unlearning outdated habits and embracing the security training evolution helps you build a resilient, modern cybersecurity culture.</p><a href="https://securepractice.co/blog/security-training-evolution" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 06 Jun 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Embracing Product Development, MVP Style!</title>
            <link>https://securepractice.co/blog/embracing-product-development-mvp-style</link>
            <guid isPermaLink="true">https://securepractice.co/blog/embracing-product-development-mvp-style</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL19kc2M4NDA1LmpwZw/_dsc8405.jpg?w=1200&h=900&fit=crop&s=37338c9c113c123818d21290cd54bd8e"/><p>Can we achieve perfection for the launch? No. But let me share my thoughts on developing a product that will provide incredible value (and fun times) to our cybersecurity community.</p><a href="https://securepractice.co/blog/embracing-product-development-mvp-style" rel="nofollow">Read more</a>]]></description>
            <pubDate>Tue, 03 Jun 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>There’s no big green button: what security awareness automation can (and can’t) do</title>
            <link>https://securepractice.co/blog/security-awareness-automation-value</link>
            <guid isPermaLink="true">https://securepractice.co/blog/security-awareness-automation-value</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/images/blog/awareness-program-1ca.svg"/><p>Security culture isn’t instant. Learn how awareness automation can help, and where balancing effort, speed, and impact matters most.</p><a href="https://securepractice.co/blog/security-awareness-automation-value" rel="nofollow">Read more</a>]]></description>
            <pubDate>Thu, 22 May 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>How to create security content people want to read (+ 6 tools to help)</title>
            <link>https://securepractice.co/blog/security-awareness-content-tools</link>
            <guid isPermaLink="true">https://securepractice.co/blog/security-awareness-content-tools</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3RlYW0vMTY3OC5qcGc/1678.jpg?w=1200&h=900&fit=crop-99-48-1&s=a89647c326ae7a9d80246f81eb2ba344"/><p>Learn how to create security awareness content people want to read—with tips, examples, and 6 tools to get you started.</p><a href="https://securepractice.co/blog/security-awareness-content-tools" rel="nofollow">Read more</a>]]></description>
            <pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>The business case for security awareness training: how to prove ROI and win management support</title>
            <link>https://securepractice.co/blog/security-awareness-training-roi</link>
            <guid isPermaLink="true">https://securepractice.co/blog/security-awareness-training-roi</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9jb252ZXJzYXRpb24uanBn/conversation.jpg?w=1200&h=900&fit=crop&s=13bbc92baf5049b16551e51dbcf3f7ee"/><p>How to make a compelling case for security awareness training and show its ROI to management.</p><a href="https://securepractice.co/blog/security-awareness-training-roi" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 21 Apr 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Not everyone learns security the same way—so why do we teach it like that?</title>
            <link>https://securepractice.co/blog/security-training</link>
            <guid isPermaLink="true">https://securepractice.co/blog/security-training</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9oZXJvLWN5YmVyZXhlcmNpc2VzLTAxLmpwZw/hero-cyberexercises-01.jpg?w=1200&h=900&fit=crop&s=a19f73eedaa26c2fcce9e7f1a354ad13"/><p>Why people tune out security awareness and what to do instead. Learn how to make training actually work by teaching it the way people learn best.</p><a href="https://securepractice.co/blog/security-training" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 31 Mar 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Why your incident preparedness strategy isn’t working (and what to do about it)</title>
            <link>https://securepractice.co/blog/incident-preparedness-exercise</link>
            <guid isPermaLink="true">https://securepractice.co/blog/incident-preparedness-exercise</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9hbGwtaGFuZHMtbWVldGluZy5qcGc/all-hands-meeting.jpg?w=1200&h=900&fit=crop&s=c30c81a1baf5b3da792dff436b48a280"/><p>Is your incident preparedness plan failing? Explore the myths behind it and learn how real-world exercises can improve your team’s readiness.</p><a href="https://securepractice.co/blog/incident-preparedness-exercise" rel="nofollow">Read more</a>]]></description>
            <pubDate>Tue, 18 Mar 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Show, don't tell —</title>
            <link>https://securepractice.co/blog/show-dont-tell</link>
            <guid isPermaLink="true">https://securepractice.co/blog/show-dont-tell</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL2Jsb2ctY292ZXJzL3d3eWQuanBn/wwyd.jpg?w=1200&h=900&fit=crop&s=723cf1c3dc24a37065cd585907ebc9aa"/><p>It wasn’t exactly that we were actively looking for a new product to build, instead it was more a matter of inspiration, learning and a clear call to action. Our founder Erlend shares below why we’re putting so much effort into PrepJam right now.</p><a href="https://securepractice.co/blog/show-dont-tell" rel="nofollow">Read more</a>]]></description>
            <pubDate>Tue, 04 Mar 2025 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>The heart of security: using the Think, Feel, Say, Do framework to create personal, effective training</title>
            <link>https://securepractice.co/blog/think-feel-say-do-framework</link>
            <guid isPermaLink="true">https://securepractice.co/blog/think-feel-say-do-framework</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/images/blog-covers/think-feel-say-do-1a-svgo.svg"/><p>How to use the Think, Feel, Say, Do framework to lead cybersecurity education with empathy and meet the emotional needs of your team.</p><a href="https://securepractice.co/blog/think-feel-say-do-framework" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 16 Dec 2024 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Part 2: How to manage human risk without losing trust, hope, or your mind</title>
            <link>https://securepractice.co/blog/managing-human-threat</link>
            <guid isPermaLink="true">https://securepractice.co/blog/managing-human-threat</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9hdHRhY2tlci1tZXNzYWdlLmpwZw/attacker-message.jpg?w=1200&h=900&fit=crop-48-65-1&s=dc80863537e49fd9fdc5e18482141214"/><p>Turn the human threat into strength. Strategies to secure your team without losing their trust.</p><a href="https://securepractice.co/blog/managing-human-threat" rel="nofollow">Read more</a>]]></description>
            <pubDate>Tue, 22 Oct 2024 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Part 1: The human threat in cybersecurity: the true risk and how to mitigate it</title>
            <link>https://securepractice.co/blog/human-threat-in-cybersecurity</link>
            <guid isPermaLink="true">https://securepractice.co/blog/human-threat-in-cybersecurity</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9pbmNvbWluZy1jYWxsLmpwZw/incoming-call.jpg?w=1200&h=900&fit=crop-35-63-1&s=33ddea1450048093f2c953d0e5398347"/><p>Learn how human nature fuels cyber threats and discover strategies to turn it into your strongest defense.</p><a href="https://securepractice.co/blog/human-threat-in-cybersecurity" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 14 Oct 2024 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>The power of getting it wrong: how mistakes reduce human cyber risk</title>
            <link>https://securepractice.co/blog/how-mistakes-reduce-human-cyber-risk</link>
            <guid isPermaLink="true">https://securepractice.co/blog/how-mistakes-reduce-human-cyber-risk</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy90aHVtYnMtdXAtZG93bi1waG9uZS5qcGc/thumbs-up-down-phone.jpg?w=1200&h=900&fit=crop-53-57-1&s=e484b2f1c7ff27ce9bbae43bc1129326"/><p>Learn how embracing mistakes in cybersecurity boosts learning, improves processes, and engages colleagues. Don’t let fear of errors hold your team back.</p><a href="https://securepractice.co/blog/how-mistakes-reduce-human-cyber-risk" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 09 Aug 2024 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Now what? What to do after a cybersecurity exercise</title>
            <link>https://securepractice.co/blog/after-cybersecurity-exercise</link>
            <guid isPermaLink="true">https://securepractice.co/blog/after-cybersecurity-exercise</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9hdWRpZW5jZS1zdGFnZS5qcGc/audience-stage.jpg?w=1200&h=900&fit=crop&s=5c1a6b30bcc21020f530fd752224e62a"/><p>You have done the preparedness exercise, and the head is full of thoughts and impressions. But what should you focus on when it comes to improving your cyber security resilience?</p><a href="https://securepractice.co/blog/after-cybersecurity-exercise" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 29 Apr 2024 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>How to evaluate a cybersecurity exercise</title>
            <link>https://securepractice.co/blog/how-to-evaluate-cybersecurity-exercise</link>
            <guid isPermaLink="true">https://securepractice.co/blog/how-to-evaluate-cybersecurity-exercise</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9jb252ZXJzYXRpb24uanBn/conversation.jpg?w=1200&h=900&fit=crop&s=13bbc92baf5049b16551e51dbcf3f7ee"/><p>A preparedness exercise is a valuable opportunity to test your incident management plans and identify areas for improvement.</p><a href="https://securepractice.co/blog/how-to-evaluate-cybersecurity-exercise" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 29 Apr 2024 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>How to succeed with cybersecurity exercises</title>
            <link>https://securepractice.co/blog/how-to-succeed-with-cybersecurity-exercises</link>
            <guid isPermaLink="true">https://securepractice.co/blog/how-to-succeed-with-cybersecurity-exercises</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9hbGwtaGFuZHMtbWVldGluZy5qcGc/all-hands-meeting.jpg?w=1200&h=900&fit=crop&s=c30c81a1baf5b3da792dff436b48a280"/><p>Performing a cyber exercise is a crucial step in ensuring that your organization can effectively respond to and recover from cyber threats. Here are some steps you can take to prepare for a cyber exercise.</p><a href="https://securepractice.co/blog/how-to-succeed-with-cybersecurity-exercises" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 29 Apr 2024 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Measure and manage human cyber risk with Secure Practice</title>
            <link>https://securepractice.co/blog/measure-and-manage-human-cyber-risk-with-secure-practice</link>
            <guid isPermaLink="true">https://securepractice.co/blog/measure-and-manage-human-cyber-risk-with-secure-practice</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3RlYW0vMDk5M18xLmpwZw/0993_1.jpg?w=1200&h=900&fit=crop&s=c8bd28b4bfc2ba4f0a129e615f95683b"/><p>Staying safe online has never been more important, both at work and in personal life. But people are different, both in their level of risk understanding, and also their personal interest in security. Therefore, our team is proud to present the biggest update to our security awareness, training and culture platform so far.</p><a href="https://securepractice.co/blog/measure-and-manage-human-cyber-risk-with-secure-practice" rel="nofollow">Read more</a>]]></description>
            <pubDate>Thu, 27 Oct 2022 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>How privacy fits into Human risk management</title>
            <link>https://securepractice.co/blog/privacy-human-risk-management</link>
            <guid isPermaLink="true">https://securepractice.co/blog/privacy-human-risk-management</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3RlYW0vMTIxNi5qcGc/1216.jpg?w=1200&h=900&fit=crop&s=d1f368f574dfd2bc748829b823292821"/><p>Privacy by design is a fundamental aspect of services offered by Secure Practice, including our data-driven tools for measuring and managing human cyber risk in organizations.</p><a href="https://securepractice.co/blog/privacy-human-risk-management" rel="nofollow">Read more</a>]]></description>
            <pubDate>Thu, 27 Oct 2022 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Onboarding info for new MailRisk users</title>
            <link>https://securepractice.co/blog/onboarding-info-for-new-mailrisk-users</link>
            <guid isPermaLink="true">https://securepractice.co/blog/onboarding-info-for-new-mailrisk-users</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/images/blog-covers/onboarding-info-mailrisk-06.svg"/><p>When the MailRisk button suddenly appears in the Outlook app for your colleagues, it is important to tell them what this shiny new button is all about. Here is a suggested way to go forward.</p><a href="https://securepractice.co/blog/onboarding-info-for-new-mailrisk-users" rel="nofollow">Read more</a>]]></description>
            <pubDate>Sat, 15 Oct 2022 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Simulated phishing: how to design a suitable scam</title>
            <link>https://securepractice.co/blog/simulated-phishing-how-to-design-a-suitable-scam</link>
            <guid isPermaLink="true">https://securepractice.co/blog/simulated-phishing-how-to-design-a-suitable-scam</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/images/blog-covers/simulated-phishing-how-to-design-a-suitable-scam-01.svg"/><p>How do you prepare the most effective phishing email to serve the goal of your exercise? In the third part of this series on simulated phishing, we describe various approaches to designing phishing content.</p><a href="https://securepractice.co/blog/simulated-phishing-how-to-design-a-suitable-scam" rel="nofollow">Read more</a>]]></description>
            <pubDate>Sat, 01 Oct 2022 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Simulated phishing: how to create a communication strategy</title>
            <link>https://securepractice.co/blog/simulated-phishing-communication-strategy</link>
            <guid isPermaLink="true">https://securepractice.co/blog/simulated-phishing-communication-strategy</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3RlYW0vMTI0MS5qcGc/1241.jpg?w=1200&h=900&fit=crop-45-44-1&s=8abfa2814266afbe9ec4bd07ad9ed27a"/><p>How do you prepare an organization for you to try and trick them? In the second part of this series on simulated phishing, we provide the outline for a communications plan.</p><a href="https://securepractice.co/blog/simulated-phishing-communication-strategy" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 30 Sep 2022 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Simulated phishing: how to develop goals and methodology</title>
            <link>https://securepractice.co/blog/simulated-phishing-goals-and-methodology</link>
            <guid isPermaLink="true">https://securepractice.co/blog/simulated-phishing-goals-and-methodology</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/images/blog-covers/goals-methodology-01.svg"/><p>Is it okay to trick your own colleagues? With simulated phishing, this is precisely what we do, when sending employees fake emails to increase their cyber awareness.</p><a href="https://securepractice.co/blog/simulated-phishing-goals-and-methodology" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 30 Sep 2022 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>How to succeed with security behavior change</title>
            <link>https://securepractice.co/blog/how-to-succeed-with-security-behavior-change</link>
            <guid isPermaLink="true">https://securepractice.co/blog/how-to-succeed-with-security-behavior-change</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3Bob3Rvcy9hdWRpZW5jZS1zY2FubmluZy5qcGc/audience-scanning.jpg?w=1200&h=900&fit=crop&s=18ab02836c18a3c84f4266338f9a4820"/><p>To stay safe online, people need to care more about the security decisions they face every day. But unless the obvious gains obviously exceed the required effort, change is often avoided.</p><a href="https://securepractice.co/blog/how-to-succeed-with-security-behavior-change" rel="nofollow">Read more</a>]]></description>
            <pubDate>Sat, 02 Jul 2022 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>How to find email headers in Outlook</title>
            <link>https://securepractice.co/blog/how-to-find-email-headers-in-outlook</link>
            <guid isPermaLink="true">https://securepractice.co/blog/how-to-find-email-headers-in-outlook</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/images/blog-covers/email-headers-01.svg"/><p>Have you ever received an email and wondered if it could be dangerous? It is definitely a good idea to report the suspicious email to IT, but the usefulness of your reporting increases if you are able to analyze the email headers.</p><a href="https://securepractice.co/blog/how-to-find-email-headers-in-outlook" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 12 Nov 2021 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Evading suspicious email detection through abused redirect</title>
            <link>https://securepractice.co/blog/detection-evasion-through-abused-redirect</link>
            <guid isPermaLink="true">https://securepractice.co/blog/detection-evasion-through-abused-redirect</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/images/blog-covers/evasion-detection-01.svg"/><p>Does your website allow the forwarding of end-users to URLs provided as a user-provided URL parameter? If so, it may potentially be abused in phishing campaigns, along with your web domain reputation.</p><a href="https://securepractice.co/blog/detection-evasion-through-abused-redirect" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 30 Aug 2021 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Feeling the difference between human error and secure behavior</title>
            <link>https://securepractice.co/blog/feeling-the-difference-between-human-error-and-secure-behavior</link>
            <guid isPermaLink="true">https://securepractice.co/blog/feeling-the-difference-between-human-error-and-secure-behavior</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL2Jsb2ctY292ZXJzL2RpZmZlcmVuY2UtMDQuanBn/difference-04.jpg?w=1200&h=900&fit=crop&s=382cc2bbb95058bf630049f8644dd163"/><p>What do emotions and empathy have to do with digital security? Can job satisfaction increase password quality? See the talk on what scientific research on these matters.</p><a href="https://securepractice.co/blog/feeling-the-difference-between-human-error-and-secure-behavior" rel="nofollow">Read more</a>]]></description>
            <pubDate>Tue, 08 Dec 2020 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>MailRisk wins the best new security product award</title>
            <link>https://securepractice.co/blog/mailrisk-wins-best-new-security-product-award</link>
            <guid isPermaLink="true">https://securepractice.co/blog/mailrisk-wins-best-new-security-product-award</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL3RlYW0vX2RzYzE4MDhfaHEuanBn/_dsc1808_hq.jpg?w=1200&h=900&fit=crop-56-31-1&s=b3d2590e936c9d583fce29cc6f3799de"/><p>It was a great pleasure for us to receive the Outstanding Security Performance Award (OSPA) at the Norwegian Business and Industry Security Council (NSR) security conference.</p><a href="https://securepractice.co/blog/mailrisk-wins-best-new-security-product-award" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 21 Sep 2020 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Phishing with Azure AD B2B Collaboration</title>
            <link>https://securepractice.co/blog/phishing-with-azure-ad-b2b-collaboration</link>
            <guid isPermaLink="true">https://securepractice.co/blog/phishing-with-azure-ad-b2b-collaboration</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/images/blog-covers/phishing-with-azure-ad-01.svg"/><p>The email has invites@microsoft.com as sender, and every technical investigation (both SPF, DKIM and DMARC) shows that the email itself has indeed been sent from Microsoft.</p><a href="https://securepractice.co/blog/phishing-with-azure-ad-b2b-collaboration" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 21 Sep 2020 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>SPF shortcomings with Return-Path in spoofed emails</title>
            <link>https://securepractice.co/blog/spf-shortcomings-with-return-path-in-spoofed-emails</link>
            <guid isPermaLink="true">https://securepractice.co/blog/spf-shortcomings-with-return-path-in-spoofed-emails</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/images/blog-covers/spf-shortcomings-01.svg"/><p>Email was never designed to be safe, but protocol additions like SPF have improved our ability to detect spoofed senders. We have discovered a trend in forging the Return-Path header, which SPF does not deal with on its own.</p><a href="https://securepractice.co/blog/spf-shortcomings-with-return-path-in-spoofed-emails" rel="nofollow">Read more</a>]]></description>
            <pubDate>Mon, 21 Sep 2020 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Secure software with OWASP Application Security Verification Standard</title>
            <link>https://securepractice.co/blog/secure-software-with-owasp-asvs</link>
            <guid isPermaLink="true">https://securepractice.co/blog/secure-software-with-owasp-asvs</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL2Jsb2ctY292ZXJzL3NlY3VyZS1zb2Z0d2FyZS1vd2FzcC1hc3ZzLTAxLmpwZw/secure-software-owasp-asvs-01.jpg?w=1200&h=900&fit=crop&s=3359184770dcbb2c230d46d0af1b097c"/><p>Are you working on security requirements in software development, test or procurement? There is no need to re-invent the wheel. See the talk on how OWASP Application Security Verification Standard (ASVS) can help.</p><a href="https://securepractice.co/blog/secure-software-with-owasp-asvs" rel="nofollow">Read more</a>]]></description>
            <pubDate>Fri, 14 Jun 2019 00:00:00 +0000</pubDate>
        </item>
      
        <item>
            <title>Experiences with simulated phishing</title>
            <link>https://securepractice.co/blog/experiences-with-simulated-phishing</link>
            <guid isPermaLink="true">https://securepractice.co/blog/experiences-with-simulated-phishing</guid>
            <description><![CDATA[<img align="left" hspace="5" src="/img/asset/aW1hZ2VzL2Jsb2ctY292ZXJzL2V4cGVyaWVuY2VzLXNpbXVsYXRlZC1waGlzaGluZy0wMS5qcGc/experiences-simulated-phishing-01.jpg?w=1200&h=900&fit=crop&s=1c7f93d368234590217d1f38f33ecc02"/><p>Are you assessing whether simulated phishing may be a good thing to do in your company? See this video for useful steps and input to prepare and launch your own internal phishing campaign.</p><a href="https://securepractice.co/blog/experiences-with-simulated-phishing" rel="nofollow">Read more</a>]]></description>
            <pubDate>Thu, 23 May 2019 00:00:00 +0000</pubDate>
        </item>
      
   </channel>
</rss>
