Resources

Guide

2023 Phishing Benchmark Global Report

Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Blog

Four Ways to Make Cyber Security Employee Training Fun

Let’s be honest: cyber security employee training has a reputation for being dull. Most employees dread it. They expect dry training talks, lackluster presentations, and examples they can’t relate to. In any training, people must come first. You should create a model that focuses on the people you’re trying to reach: your own employees. A people-centric approach lets you focus your cyber security...
Blog

Let's Compare Cyber Security Risks by Generation: Gen X, Millennials, and Gen Z

A lot of ink over the years has gone into comparing the most common generations within the workplace—and for a good reason. Generations are a great way to compare and study variations in broad subjects like the importance of job security, working habits, and technology usage. These generalizations have been crucial data for many important workplace improvements, including cyber security awareness...
Blog

5 Ways Your Organization Should Take Advantage of Cyber Security Awareness Month

With an ever-increasing threat complexity across the cyber threat landscape, Cyber Security Awareness Month (CSAM) provides an opportunity to reflect on how enterprises can enhance their defenses and educate employees on cyber security best practices. Few areas are as important to focus on as security awareness. As part of the 2021 Gone Phishing Tournament , launched during CSAM, Terranova...
Blog

Defining an Information Security Program

Every organization, regardless of size or revenue generated, needs an information security program (ISP), a collection of initiatives that form the basis for any cyber security plan involving confidential data. A well-developed information security program enables your organization to take an inclusive approach to protecting data such as protected health information (PHI), personally identifiable...
Blog

Keep Your Employees Safe Online on Cyber Monday

Cyber Monday is right around the corner and this means employees will be shopping online at work. To prepare for the busiest online shopping day of the year, companies need to remind employees of how to be safe online . It’s very easy for even the most cyber-aware employees to get caught up in the rush of online holiday sales and promotions. Retailers know that shoppers want deals and start their...
Blog

Why Gamify Security Awareness Training?

Leveraging a spirit of competition to drive engagement and create a security culture Gamification is a popular concept these days, and for good reason. With gamification, you can develop a game for learning more about a serious topic while also getting the learner to approach winning that game with the same fervor they would when playing for entertainment. So what happens when you integrate...
Press Release

Terranova Recognized as a Leader in the 2018 Gartner Magic Quadrant for Security Awareness CBT

Gartner has named Terranova a Leader in the Magic Quadrant for Security Awareness computer-based training! We are very pleased to see that Gartner has recognized us based on what we feel is the significant work that we have done to execute on our vision and demonstrate leadership in the market. The Security Awareness Training market is characterized by a relatively low barrier to entry. While it...
Guide

The Human Fix To Human Risk

Discover the secret to making your employees your most robust defense against cyber attacks. Flip the narrative with The Human Fix to Human Risk.
Blog

Employee error leads to Rogers Communications data breach

While certainly not the biggest data breach in recent memory, this Rogers Communications incident demonstrates how a seemingly small employee error can have significant consequences in the realm of cybersecurity. Data breaches have become major news topics and with good reason. These incidents have major implications not just for the businesses affected but also for their employees, their...
Blog

Secure Behavior in the Office

Nowadays, information security is a very common term used in the business world. Previously, security was simply a matter of installing a firewall to protect a corporate network by adding barriers to prevent intruders from access it. In the last few years, information has become electronic, or should I say virtual, in its primary form. What used to be on hard copy or paper form is now stored...