<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Threats - AwareGO</title>
	<atom:link href="https://awarego.com/category/cyber-threats/feed/" rel="self" type="application/rss+xml" />
	<link>https://awarego.com</link>
	<description>Awareness &#38; Compliance Training</description>
	<lastBuildDate>Mon, 30 Mar 2026 11:41:18 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://awarego.com/wp-content/uploads/2021/11/cropped-image-32x32.png</url>
	<title>Cyber Threats - AwareGO</title>
	<link>https://awarego.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Ultimate Guide to Micro-learning for Cybersecurity in 2026</title>
		<link>https://awarego.com/the-ultimate-guide-to-micro-learning-for-cybersecurity-in-2026/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-ultimate-guide-to-micro-learning-for-cybersecurity-in-2026</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Press release]]></category>
		<category><![CDATA[The Human Fix for Cyber Risks]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[employee training]]></category>
		<category><![CDATA[human risk]]></category>
		<category><![CDATA[Micro-learning]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<category><![CDATA[Security Habits]]></category>
		<category><![CDATA[Security Training]]></category>
		<guid isPermaLink="false">https://awarego.com/the-ultimate-guide-to-micro-learning-for-cybersecurity-in-2026/</guid>

					<description><![CDATA[<p>Your annual security training is over. A week later, how much do your employees truly remember? The forgetting curve is a real threat, and those...</p>
<p>The post <a href="https://awarego.com/the-ultimate-guide-to-micro-learning-for-cybersecurity-in-2026/">The Ultimate Guide to Micro-learning for Cybersecurity in 2026</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Human Risk Assessment: The Strategic Guide for Modern Cybersecurity (2026)</title>
		<link>https://awarego.com/human-risk-assessment-the-strategic-guide-for-modern-cybersecurity-2026/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=human-risk-assessment-the-strategic-guide-for-modern-cybersecurity-2026</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[The Human Fix for Cyber Risks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data-driven security]]></category>
		<category><![CDATA[employee training]]></category>
		<category><![CDATA[human risk assessment]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<guid isPermaLink="false">https://awarego.com/human-risk-assessment-the-strategic-guide-for-modern-cybersecurity-2026/</guid>

					<description><![CDATA[<p>Is your security training budget working? It’s a tough question to answer when you can’t measure the return. You see insurance premiums rise and know...</p>
<p>The post <a href="https://awarego.com/human-risk-assessment-the-strategic-guide-for-modern-cybersecurity-2026/">Human Risk Assessment: The Strategic Guide for Modern Cybersecurity (2026)</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>7 Ways to Create Gamified Cybersecurity Training That Engages Employees in 2024</title>
		<link>https://awarego.com/7-ways-to-create-gamified-cybersecurity-training/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=7-ways-to-create-gamified-cybersecurity-training</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Fri, 14 Jun 2024 09:27:00 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[cybersecurity awareness training]]></category>
		<category><![CDATA[gamified cybersecurity training]]></category>
		<guid isPermaLink="false">https://awarego.com/?p=18170</guid>

					<description><![CDATA[<p>Gamified cybersecurity training remains a powerful tool to engage employees and reinforce crucial security practices. With evolving threats and technologies, keeping training methods current is vital. Here are 7 updated strategies for 2024: 1. Interactive Videos Develop short, entertaining training videos that depict real-life cybersecurity scenarios. Interactive elements, such as choosing different outcomes based on [&#8230;]</p>
<p>The post <a href="https://awarego.com/7-ways-to-create-gamified-cybersecurity-training/">7 Ways to Create Gamified Cybersecurity Training That Engages Employees in 2024</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Demystifying the Myths about Cloud Security: What You Need to Know</title>
		<link>https://awarego.com/demystifying-the-myths-about-cloud-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=demystifying-the-myths-about-cloud-security</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Wed, 05 Jul 2023 08:00:00 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[data safety]]></category>
		<category><![CDATA[security culture]]></category>
		<guid isPermaLink="false">https://awarego.com/?p=18557</guid>

					<description><![CDATA[<p>Cloud computing has revolutionized the way businesses operate, offering them cost efficiency, scalability, and unprecedented flexibility. Yet, despite its growing adoption, misconceptions about cloud security continue to persist. These misconceptions can deter organizations from leveraging the full benefits of the cloud or, conversely, lead to complacency about real risks. Here are 6 common myths surrounding [&#8230;]</p>
<p>The post <a href="https://awarego.com/demystifying-the-myths-about-cloud-security/">Demystifying the Myths about Cloud Security: What You Need to Know</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Remote Working Cybersecurity: 9 Ways to Stay Safe Outside of the Office</title>
		<link>https://awarego.com/remote-working-cybersecurity-9-ways-to-stay-safe/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=remote-working-cybersecurity-9-ways-to-stay-safe</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Fri, 30 Jun 2023 08:00:00 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[data safety]]></category>
		<category><![CDATA[security culture]]></category>
		<category><![CDATA[tips]]></category>
		<guid isPermaLink="false">https://awarego.com/?p=18546</guid>

					<description><![CDATA[<p>Over the past few years, remote working has become a norm rather than the exception. While this flexible working style offers numerous benefits, it has also opened up a new set of remote working cybersecurity vulnerabilities. Employees working from various networks and using personal devices to access company resources can potentially expose the organization to [&#8230;]</p>
<p>The post <a href="https://awarego.com/remote-working-cybersecurity-9-ways-to-stay-safe/">Remote Working Cybersecurity: 9 Ways to Stay Safe Outside of the Office</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>AI Security Risks: Understanding the Hidden Dangers of Using Artificial Intelligence for Work</title>
		<link>https://awarego.com/ai-security-risks-hidden-dangers-of-using-ai/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ai-security-risks-hidden-dangers-of-using-ai</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Mon, 19 Jun 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[data safety]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://awarego.com/?p=18376</guid>

					<description><![CDATA[<p>In today&#8217;s rapidly evolving digital landscape, artificial intelligence (AI) has emerged as a significant game-changer, affecting almost every industry. It has expanded possibilities in ways that were only a part of science fiction a few decades ago. However, with these advances come potential AI security risks that organizations need to acknowledge and mitigate. Unsupervised Learning [&#8230;]</p>
<p>The post <a href="https://awarego.com/ai-security-risks-hidden-dangers-of-using-ai/">AI Security Risks: Understanding the Hidden Dangers of Using Artificial Intelligence for Work</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Locking the Digital Doors: Implementing Access Controls to Prevent Cybersecurity Tailgating</title>
		<link>https://awarego.com/locking-the-digital-doors-to-prevent-tailgating/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=locking-the-digital-doors-to-prevent-tailgating</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Fri, 09 Jun 2023 08:00:00 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[data safety]]></category>
		<category><![CDATA[tailgating]]></category>
		<guid isPermaLink="false">https://awarego.com/?p=18370</guid>

					<description><![CDATA[<p>The digital landscape is a sprawling, interconnected network teeming with opportunities for businesses and individuals alike. However, it also presents an ample hunting ground for malicious actors seeking to exploit vulnerabilities. Among these vulnerabilities is a concept known as &#8216;tailgating&#8217; or &#8216;piggybacking&#8217; in the cybersecurity realm.&#160; Tailgating refers to unauthorized individuals gaining access to restricted [&#8230;]</p>
<p>The post <a href="https://awarego.com/locking-the-digital-doors-to-prevent-tailgating/">Locking the Digital Doors: Implementing Access Controls to Prevent Cybersecurity Tailgating</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>The Cost of Tailgating: Understanding the Financial Impact of Physical Security Breaches</title>
		<link>https://awarego.com/the-cost-of-tailgating/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-cost-of-tailgating</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Thu, 11 May 2023 14:00:00 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[data safety]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[tailgating]]></category>
		<guid isPermaLink="false">https://awarego.com/?p=18350</guid>

					<description><![CDATA[<p>Tailgating, also known as piggybacking, is a physical security breach that occurs when an unauthorized person follows an authorized individual into a restricted area without proper identification. Although tailgating is a physical security issue it is very much connected to cybersecurity as tailgating is one method used by cybercriminals to gain access to sensitive data [&#8230;]</p>
<p>The post <a href="https://awarego.com/the-cost-of-tailgating/">The Cost of Tailgating: Understanding the Financial Impact of Physical Security Breaches</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>The Future of IT Security Awareness: AI, Chat GPT, and Emerging Technologies</title>
		<link>https://awarego.com/the-future-of-it-security-awareness-training/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-future-of-it-security-awareness-training</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Tue, 09 May 2023 14:49:13 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[data safety]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">https://awarego.com/?p=18342</guid>

					<description><![CDATA[<p>In today&#8217;s fast-paced digital landscape, IT security threats are continuously evolving, and organizations must keep pace with the latest technologies and trends to stay ahead of the curve. IT security awareness training is no exception, and as we move towards a more interconnected world, we can expect to see several emerging trends and technologies that [&#8230;]</p>
<p>The post <a href="https://awarego.com/the-future-of-it-security-awareness-training/">The Future of IT Security Awareness: AI, Chat GPT, and Emerging Technologies</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>The Rise of Social Engineering Attacks and Using Information Security Awareness To Prevent Them</title>
		<link>https://awarego.com/social-engineering-and-information-security-awareness/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=social-engineering-and-information-security-awareness</link>
		
		<dc:creator><![CDATA[Ragnar Sigurðsson]]></dc:creator>
		<pubDate>Wed, 05 Apr 2023 19:08:57 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[data safety]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://awarego.com/?p=18322</guid>

					<description><![CDATA[<p>Social engineering attacks are a growing threat to businesses and individuals alike. These attacks are designed to trick people into divulging sensitive information, such as login credentials, financial information, or personal data. Social engineering attacks can take many forms, including phishing emails, phone calls, or text messages, and they can be highly effective. In fact, [&#8230;]</p>
<p>The post <a href="https://awarego.com/social-engineering-and-information-security-awareness/">The Rise of Social Engineering Attacks and Using Information Security Awareness To Prevent Them</a> first appeared on <a href="https://awarego.com">AwareGO</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
