Security Awareness

Businesswoman typing and looking through magnifying glass against blue background, Key visual for CSI Phishing Game

GLS Releases First-of-its-Kind ‘CSI: Phishing’ Game, Turning Learners into Cybersecurity Investigators New cybersecurity investigations (CSI) game revolutionizes anti-phishing training by putting end users in the driver’s seat COLUMBIA, Md., (June […]

computer showing phishing game representing phish training gamification

Engagement. When it comes to training, engagement is everything. Engaged users retain more of the information they learn and are better able to put it into practice. How can you

keyboard with fish hook representing phishing statistics

The latest phishing stats tell the story: Phishing is the most prevalent form of cyberattack causing data breaches for both individuals and organizations. While phishing can come in many forms

teacher and middle school kids using computers in classroom representing cybersecurity in schools

While malicious cyberattacks on large corporations often garner the most attention, cybersecurity in schools has become a significant concern. Recent cyber incidents show how a data breach can impact private

Graphic of code representing OWASP Top 10 2021

The Open Web Application Security Project (OWASP) released its OWASP Top 10 2021 list of web application vulnerabilities in September 2021 during the celebration of the group’s 20th anniversary. The

hands opening email on mobile device representing business email compromise

Did you know that business email compromise losses reported in 2021 totaled $2.4 billion, according to the Internet Crime Report released by the FBI’s Internet Crime Complaint Center (IC3)? Email

woman working in coffee shop representing WFH and WFA cybersecurity

Many CISOs and CIOs are dealing with the advent of employees who work from home (WFH) and/or work from anywhere (WFA) as it relates to keeping networks and data secure.

control room of global supply chain company showing maps and senior security technicians

As we look to the near future, cyber security experts have identified key areas that warn of impending future attacks and how extra measures will begin to emerge as we

bitcoin and computer code representing cost of cyber attacks

In 2021, hackers continued to find new ways to exploit security weaknesses and vulnerabilities, demanding money for the return of confidential data and information. It’s helpful to understand the types

illustration with talk bubbles and brains representing online employee training learning modalities

After more than 30 years in the behavioral change industry, we know for certain that not all adults learn the same way. Multiple training approaches are essential to delivering effective

GLS Logo

Your download is complete!

Need more training?