We could not be more excited to finally announce our pre-seed round of funding — a round we closed last spring but delayed the announcement. Raising capital in the middle of a global pandemic was particularly challenging, but also exciting. Market conditions forced a lot of good questions for us.
Read full article →2020 is over. Many people are breathing a sigh of relief, though 2021 feels a lot like 2020 so far. The trends in security awareness are going to be shaped by the changes that went into place in 2020 and are not going away in 2021.
Read full article →In our last post, we covered the SANS Security Awareness Maturity Model. At Haekka, we take a slightly different view of security awareness programs, something we call human risk maturity. We view security awareness from the perspective of the goal, or job to be done (JTBD).
Read full article →At Haekka, we think about security awareness in stages. We start with basic awareness, move up to engagement, and then on to effectiveness. Each of these stages corresponds to a job to be done (JTBD). We’ll cover these stages in a later article. This post is focused on a similar model from SANS.
Read full article →Phishing is something every company should be actively trying to prevent. Phishing is the most commonly exploited threat to your company’s data. The lack of social engagement around phishing training is a missed opportunity to build user engagement and promote good security hygiene.
Read full article →Haekka is a security engagement platform. Technology companies hire Haekka 1) to check the box on compliance training and 2) to engage employees in security and privacy, building it into their cultures. We achieve this with our content. This post describes the two types of training content on Haekka
Read full article →We get asked about HIPAA training all the time. While most companies know that HIPAA requires some form of training, the details about what is required are often unknown or unclear. This post clarifies what HIPAA requires for training your employees.
Read full article →Employees cannot be expected to stay up to date on security best practices and privacy regulations on their own. This is why security and privacy training are more important than ever. Find out what topics to include in your training.
Read full article →Phishing is a massively common form of attack and, due to the scale of it, accounts for 80% or more of all security incidents. Software packages, sold and distributed on the dark web, are used by malicious groups to automate and scale these attacks. So what messages trick us into clicking?
Read full article →At Haekka, we’ve debated the terms “security training”, “privacy training” and “compliance training”. We ultimately decided to use the term “security and privacy training” for what we do. We felt it was worth clarifying the terms and how we use them in regards to training.
Read full article →Micro-training, as we define it at Haekka, is comprised of lessons that can be consumed in under 5 minutes. By focusing on content that provides high value for the work people are doing at technology companies, we see drastic improvement across six core components of learning.
Read full article →The advent of the LMS coincided with the emergence of digital learning. As work has moved from disconnected systems and silos to integrated workflows anchored on open, continuous communication (think Slack and Teams), training has not kept pace. Slack-native micro-training solves these problems.
Read full article →ComplianceOps is the union of people, process, products, and data to maximize continuous adherence to policies and procedures. Compliance and Operations have long operated in silos and the problems associated with this disjointed approach have become untenable for modern technology companies.
Read full article →Today, the business world operates at the speed of trust. Now, as never before, trust is a differentiator. If your company offers products and services to other businesses, it is essential that you build and maintain trust.
Read full article →With the growing focus on privacy and personal data, it has become table stakes for every B2B, and many B2C, companies to attest, or comply, with an established framework or regulation. Whether mandatory (HIPAA, GDPR, CCPA, FERPA, IRAP, PCI, etc) or by choice (SOC 2, HITRUST, etc), every company...
Read full article →In times of crisis, there’s a trade-off between personal rights and government powers. COVID-19 is opening up some very worthwhile debates about personal privacy, surveillance, and the public good. With so much uncertainty surrounding COVID, both from the start of it up until today, there are a...
Read full article →With COVID, it feels like just about everything has been flipped on its head. What was not possible just a few months ago is now suddenly the new normal. Healthcare, for one, has been at the front lines of these changes. While frontline healthcare workers in places like New York and Louisiana...
Read full article →At Haekka, we want to solve the pain of compliance for modern technology companies. Our vision is for customers to hire Haekka to solve compliance in totality without leaving modern tools like Slack. In the process, we will elevate trust in our customers.
Read full article →