They will protect their phone with a case and screen guard, but never bother turning on 2FA to protect their data.
They would never mention their vacation plans to strangers, but will post every detail on social media.
They will shred every document before disposing of it, but don't wipe old USB drives before throwing them out.
They would never lend their credit card to a stranger, but will let their browser save every password.
They will have a safe for their valuables, but will leave their sensitive information out written down on paper.
They will look both ways twice before crossing a road, but will mindlessly accept cookies left, right, and center.
They will spend hours researching the best restaurants, but won’t think twice before connecting to the free Wi-Fi once they’re there.
Explore our set of resources offering best practices and
strategies
to enhance your organization's cybersecurity.
Securing the everywhere workplace: A conversation with Jürgen Rinelli
Raising SIEM awareness and securing enterprise endpoints
Guardians of access: PAM, AI, and the future of cybersecurity ft. Ramanathan K
Social engineering and data protection in the hybrid work era
Navigating the new era of attacks
Cybersecurity budgets in India: Casual chat with Vaibhav and Pankaj from Tecpact
Essential elements for devising a cybersecurity strategy in 2025
The truth about compliance, audits, and privacy ft. Kudiyarasan Balakrishnan
Cybersecurity Masterclass with Alex Sharpe: AI's impact on cybersecurity landscape
The role of AI on the road to zero standing privileges with Ganesh Chellappa
Weaving identity security threads into enterprise-wide workflows with Kumaravel Ramakrishnan
Compliance breeds cyber discipline with Ramanthan Kannabiran