Resources

Blog

Why Strategic Goals are Important in Security Awareness Programs

Image A cyber security awareness program involves all parts of a company and needs support from every level of management. Clear strategic goals are essential to guide the program and keep it focused on its objectives. In a webinar hosted by Terranova Security’s CISO Theo Zafirakos, 42% of the attendees revealed that they don’t have...
Blog

DMARC: The Next Step in Email Hygiene and Security

Image In 1971, Ray Tomlison developed the first email service while working at The Defense Advanced Research Projects Agency (DARPA). This development changed how we communicated. However, even though this was an exceptional tool, it was not very user-friendly, requiring users to have specific software installed on their computers. ...
Blog

Pig Butchering Scam – What It Is and How to Protect Yourself

Image Cyber threats are constantly evolving, and the most recent evolution of phishing scams is proving particularly effective. Boasting a gruesome name, pig butchering is a cyber threat that reels in victims and steals thousands, sometimes millions of dollars.  Pig butchering has quickly become one of the most lucrative scams thanks...
Blog

What is Quishing?

QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives. The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes,...
Trial

Level Up Your Security Awareness with Cyber Games

83%1 of employees believe gamification motivates them to complete training These techniques, often associated with video games, have been proven to keep end users engaged with an immersive, enjoyable experience. When employees interact with gamified corporate training like Cyber Games, participation rates don’t take long to skyrocket. Score big points in the end user...
Trial

Security Awareness Training for Education

Over 22001 cyber attacks victimize education institutions weekly The reason is simple: All it takes is one ill-advised click on a suspicious link or attachment to leave your most important information vulnerable. If a data breach occurs, your organization could be on the receiving end of serious financial and reputational harm. Minimize the human risk factor and protect...
Trial

Phishing Simulation Free Trial

95% of data breaches are due to human error. Are you keeping your data safe?  Image Don’t let high-risk end user behaviors leave your sensitive information, networks, and systems at risk of a data breach. Give your employees and third-party vendors the knowledge they need to spot common phishing warning signs and keep critical data...
Guide

The Cyber Security Hub

Get and share the knowledge everyone needs to become a cyber hero! Establishing a strong security-aware organizational culture and changing user behavior is built on knowledge. To avoid data breaches, employees must be able to identify and report potential cyber threats. The Cyber Security Hub makes is easier than ever to obtain and distribute content on a variety of...
Blog

Why Modern Design Matters in Cyber Security Training

As cyber criminals keep innovating, coming up with new and more damaging attacks every year, it’s crucial for organizations worldwide to train their staff to recognize these threats. According to a study by Mastercard, a staggering 95% of data breaches are due to human error. This statistic highlights the critical importance of training employees on modern cyber threats. ...
Blog

How Often Should Employees Receive Security Awareness Training?

With cyber attacks posing a significant threat to businesses, especially to small ones where 60% don’t survive such an incident, the importance of regular and effective cyber security awareness training is more evident than ever. But what defines “regular?” What makes “effective?” This article explores the crucial aspect of training frequency. It’s not just about whether your...
Blog

The Crucial Need for Cyber Security in Nonprofits

In an increasingly digital world, the safety of sensitive information is paramount. Unfortunately, nonprofits have become a goldmine for cyber criminals seeking to exploit their often limited security measures. These organizations, while operating with smaller teams and budgets, are responsible for substantial funds and sensitive data, drawing the attention of online predators...
Guide

2023 Phishing Benchmark Global Report

Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Blog

Four Ways to Make Cyber Security Employee Training Fun

Let’s be honest: cyber security employee training has a reputation for being dull. Most employees dread it. They expect dry training talks, lackluster presentations, and examples they can’t relate to. In any training, people must come first. You should create a model that focuses on the people you’re trying to reach: your own employees.  A people-centric approach lets you...
Blog

Let's Compare Cyber Security Risks by Generation: Gen X, Millennials, and Gen Z

A lot of ink over the years has gone into comparing the most common generations within the workplace—and for a good reason. Generations are a great way to compare and study variations in broad subjects like the importance of job security, working habits, and technology usage. These generalizations have been crucial data for many important workplace improvements, including...
Blog

5 Ways Your Organization Should Take Advantage of Cyber Security Awareness Month

With an ever-increasing threat complexity across the cyber threat landscape, Cyber Security Awareness Month (CSAM) provides an opportunity to reflect on how enterprises can enhance their defenses and educate employees on cyber security best practices. Few areas are as important to focus on as security awareness. As part of the 2021 Gone Phishing Tournament, launched during...
Blog

Defining an Information Security Program

Every organization, regardless of size or revenue generated, needs an information security program (ISP), a collection of initiatives that form the basis for any cyber security plan involving confidential data. A well-developed information security program enables your organization to take an inclusive approach to protecting data such as protected health information (PHI),...