• Discover the Alarming Patterns of Common PIN Codes in a Striking Graph

    Discover the Alarming Patterns of Common PIN Codes in a Striking Graph

    The power of a graph is amazing, even more in cybersecurity. You might have already seen this but it is still captivating: A visual representation of the frequency of 4 digits PIN codes. It shows that 1234 & 4321 are still very frequent, so are pairs of the same two digits (like 0101 or 5566).…


  • Password strength explained in one slide

    Often we have to train people within a very limited timeframe. Here is an example on how to present examples of weak to strong passwords and also, foster the use of 2FA.


  • Training with images & videos? Yes, but good ones!

    To improve our security and efficiency, we need well-trained people. It doesn’t have to be everything, but it should be enough to make their lives easier and/or safer. One of the difficulties nowadays is catching people’s attention, even at the office. Forget about long documents—maybe even short ones. When we, as people, want to learn…


  • The intention-behaviour gap in cybersecurity

    More and more we see cybersecurity professionals using surveys about attitudes and intention as performance indicators of their interventions. While questions like “Do you think it is important to use complex passwords” might give an insight on someone’s attitude toward password complexity, they are not good indicators of our human-risks. Values, Attitudes, Intentions and Behaviours…


  • The Consumer Authentication Strength Maturity Model (CASMM)

    A few days ago, Daniel Miessler updated the Consumer Authentication Strength Maturity Model (CASMM) to the version 6. It is a great #visualization of consumers’ password maturity. While we are sometimes still struggling with people using shared password or bad quality passwords, it will help show the path to more secure behaviours. Also, it might…