Blog

Blog

10 Most Desired Traits of a Cyber Security Professional

Whether you’re just starting out in the workforce or making a career change, knowing what skills make up an excellent cyber security professional and how to work towards them is essential. The good news is that the industry as a whole is in dire need of qualified professionals, with the cyber skills gap totaling 3.4 million workers as of this year, a 26.2% increase since 2021. However, you still...
Blog

Are You Being Played? AI's Role in Social Engineering and How You Can Protect Yourself

While there’s no denying that AI has its advantages, it also comes with its fair share of drawbacks. One of which is its role in making social engineering easier to pull off. Cyber criminals are beginning to utilize AI software to generate the voice of chief executive officers and fool employees into revealing sensitive information or initiating monetary transfers. An astounding 82% of cyber...
Blog

Do You Know What You're Getting Into? The Risks of Social Media for Your Business

Social media has completely redefined our lives. From how we communicate to the type of information we broadcast, people worldwide have used these platforms to make new friends, share information, start and promote businesses, and so much more. These platforms have become amazingly convenient and powerful to the point where they have become a centerpiece of most people’s lives. The ubiquity of...
Blog

How to Build a Strong Security Awareness Training Program in 2023

Your employees are your first line of defense against cyber security attacks. The success or failure of your security awareness program depends on the knowledge of every employee in your organization. As part of your organizational goals and plans for 2023, you must prioritize building a cyber secure and aware culture. This requires an ongoing commitment not just among the average employees, but...
Blog

The 7 Major Concerns for Cyber Security Right Now

Cyber security is a constant battle against evolving threats. While most of the themes are the same, it is crucial to remain informed and up to date on the latest forms of every cyber threat. After all, 31% of executives said in a recent survey their main cyber security challenge was improper identification of key risks. Most companies around the globe have a cyber security awareness plan in...
Blog

Why Your Third-Party Vendors Have Almost Definitely Been Breached and What to Do About It

The news from Human Resources is that employees are happier than ever. Working from home using third-party vendor services makes work easier and more flexible. The news from IT is less enthusiastic. A recent report showed that a whopping 98% of organizations have at least one third-party provider that has suffered a data breach in the last two years. Third-party vendor relationships are nothing...
Blog

9 Examples of Social Engineering Attacks

All examples of social engineering take advantage of human nature, such as the willingness to trust others, to trick individuals into divulging sensitive information. Despite its prevalence, social engineering can be challenging to distill into a single formula. It’s one of the reasons 82% of data breaches involve the human element. Social engineering has become the backbone of many cyber threats,...
Blog

Four Ways to Make Cyber Security Employee Training Fun

Let’s be honest: cyber security employee training has a reputation for being dull. Most employees dread it. They expect dry training talks, lackluster presentations, and examples they can’t relate to. In any training, people must come first. You should create a model that focuses on the people you’re trying to reach: your own employees. A people-centric approach lets you focus your cyber...
Blog

What's the Damage? The Truth About the Cost of Data Breaches

In today's interconnected world, organizations are responsible for their cyber security practices as well as those of their third-party vendors. With increasingly complex risk management scenarios, the impact of a data breach can be catastrophic for an entire supply chain. According to a study by IBM, 83% of U.S. companies who participated have experienced a data breach more than once, costing...
Blog

Becoming a Cybersecurity Pro: The 10 Qualities You Need to Succeed

Cyber security is one of the fastest-growing fields in technology, and with the number of cyber attacks increasing every year, it’s no wonder why it’s also one of the fields hiring the most. Nowadays, almost every company needs a cyber security department to protect its data from hackers and scammers. Cybercrime magazine estimates there will be over 3.5 million cyber security job openings in the...
Blog

The California Privacy Rights Act (CPRA) and How it Affects Your Business

New regulations are already keeping IT professionals on their toes in 2023. One monumental change for California residents and businesses is the California Privacy Rights Act (CPRA). The legislation came into force on January 1, 2023. Legislators drafted the new rules to empower consumers and close gaps in the California Consumer Privacy Act (CCPA). The CPRA gives customers more control over...
Blog

Let's Compare Cyber Security Risks by Generation: Gen X, Millennials, and Gen Z

A lot of ink over the years has gone into comparing the most common generations within the workplace—and for a good reason. Generations are a great way to compare and study variations in broad subjects like the importance of job security, working habits, and technology usage. These generalizations have been crucial data for many important workplace improvements, including cyber security awareness...
Blog

How to Measure the Success of Your Security Awareness Program

There’s no way to measure your security awareness program’s success unless you identify the behaviors you want to address and develop a clear, actionable strategy. However, many cyber security leaders struggle to create a framework to quantify the success of their security awareness training. As a result, their organizations rely on intuition rather than clearly defined objectives and supporting...
Blog

The Security Risks of Improper Employee Offboarding and How to Prevent It

Employees come and go for a variety of reasons. If you’re lucky, they’ll be very cooperative with the offboarding process, but this isn’t always the case. And even if they are, you still have to take it with a grain of salt. Some say that calm and cooperative offboarding is often the most dangerous because people aren’t as diligent when the situation seems lax. If these moments have any...
Blog

Countering The 5 Most Common Social Media Phishing Scams

It’s upsetting when bad actors turn the good things in life against us. We use social media daily to celebrate, learn, keep in touch, fall in love, and buy things that satisfy our needs and wants. Unfortunately, hackers exploit that information to execute phishing attacks. Social media platforms did not only experience more attacks in 2022, but it’s also become the fastest-growing attack surface....
Blog

March 2023 Marks the 19th Anniversary of Fraud Prevention Month in Canada

March is Fraud Prevention Month, and Terranova Security wants to take this opportunity to emphasize the importance of raising awareness on information security best practices. Let’s stop online fraud in its tracks. As security professionals focused on Information Security Awareness (ISA), much of what we do is fraud prevention. Our aims and actions have a direct link to Fraud Prevention Month,...
Blog

Don’t Be A Victim of CEO Fraud

Everyone wants to look good in front of their boss. Which is exactly why an urgent email from the CEO of your company is guaranteed to catch your attention. You’re more likely to act on the request immediately without questioning the details. But what if that email didn’t come from your boss? All it takes is one savvy email that encourages an employee to act on behalf of their team leader. For...
Blog

Cyber Security In The Education Sector

The education sector experienced a "record-breaking" year of cyber attacks in 2020. In case you'd been sleeping under a rock, there was a global pandemic that drove up the need for virtual setups. According to Microsoft, education is globally the sector most vulnerable to threats like malware, accounting for more than 6.8 million (over 63%) of total reported encounters in early 2022. It's not...
Blog

What You Need to Know About the Google Drive Scam

Hackers are targeting hundreds of thousands of Google users with fake Google Drive notifications and emails to try and trick them into visiting malicious websites.
Blog

The Crypto Crash: How it Affects Cyber Security in 2023 and What to Do About It

The crypto market has been on a wild ride over the past few years, with prices soaring to all-time highs in 2017 and then crashing just as dramatically in 2018. And while the market has been relatively stable in recent months, many experts predict another crash in 2023. But what does this mean for cyber security? In this article, we’ll explore the potential effects of the crypto crash on...