Resources

Blog

What is Quishing?

QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives. The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes,...
Demo

Enhance Vulnerability Management with Security Awareness Training

Change Unsafe Behaviors to Build a Cyber-Aware Culture Help your IT team sleep better at night with the knowledge that your security awareness training helps employees detect and report potential cyber threats consistently. By implementing interactive, engaging awareness training programs, you create an organizational culture where security best practices are always a...
Demo

Do your third-party vendors know how to keep your data safe?

98% of organizations worldwide are connected to breached third-party vendors. The top 2%? They're not “lucky,” they're just equipped with robust third-party risk management (TPRM). Get a comprehensive TPRM that has a cyber security awareness training aspect. Without this, third-party contractors, suppliers, or vendors may leave sensitive information vulnerable to hackers. ...
Blog

The 5 Most Common Supply Chain Attacks

Say, have you heard anything about supply chains lately? Of course, you have. This phrase has entered the zeitgeist with more gusto than Taylor Swift oozing rizz in a Chiefs jersey. When we talk about the price of things, be they groceries or concert tickets, the conversation inevitably turns to someone remarking on “the supply chain,” and the rest of us nod knowingly. Which...
Blog

How to Develop Security Awareness Training

According to Valimail’s Spring 2019 Email Fraud Landscape, about 3.4 billion phishing emails are sent each day, making it one of the most common types of cyber attacks. This number shows how crucial it is to train your employees so they can recognize and report malicious emails. That’s where cyber security awareness training comes in. With the right training program, you can...
Blog

The Chain Reaction: Why Cyber Security in Supply Chain Networks is Critical

Imagine countless organizations working together like a well-oiled machine to create and deliver the products and services we rely on. That’s what supply chain networks are. Like a machine, each connection is vital to make the whole thing work. It’s a delicate dance of supply and demand, where each organization plays its part in keeping the network alive and thriving. And...
Blog

Risky Business: When Third-Party Troubles Become Your Own

Businesses don’t stand and operate alone. Organizations partner with an average of 10 third-party vendors to manage their operations. Especially when talking about large corporations—they collaborate with various other organizations or firms helping them manage and advance their operations. These firms include suppliers, manufacturers, service providers, software vendors,...
Blog

Android vs iOS: Which Operating System is Safer?

Cellphones have seen one of the most dramatic technological growths of any hardware in recent history. From simple portable phones a few decades ago, they’ve become fully-fledged computers with their own OS and applications used daily by most people worldwide. Smartphones have become such a fixture of life, and hackers and scammers have been working to exploit these devices...
Blog

How to Enhance Third Party Risk Management with Cyber Security Training

Did you know that on average, every company is connected to ten third-party businesses? There’s the payroll services company that remotely manages employee wages. The Software-as-a-Service (SaaS) cloud storage provider that backs up customer account data. The security company that provides access control to company buildings and systems. To achieve an efficient supply chain,...
Blog

Why Your Third-Party Vendors Have Almost Definitely Been Breached and What to Do About It

The news from Human Resources is that employees are happier than ever. Working from home using third-party vendor services makes work easier and more flexible. The news from IT is less enthusiastic. A recent report showed that a whopping 98% of organizations have at least one third-party provider that has suffered a data breach in the last two years. Third-party vendor...
Blog

The Security Risks of Improper Employee Offboarding and How to Prevent It

Employees come and go for a variety of reasons. If you’re lucky, they’ll be very cooperative with the offboarding process, but this isn’t always the case. And even if they are, you still have to take it with a grain of salt. Some say that calm and cooperative offboarding is often the most dangerous because people aren’t as diligent when the situation seems lax. If these...
Blog

March 2023 Marks the 19th Anniversary of Fraud Prevention Month in Canada

March is Fraud Prevention Month, and Terranova Security wants to take this opportunity to emphasize the importance of raising awareness on information security best practices. Let’s stop online fraud in its tracks. As security professionals focused on Information Security Awareness (ISA), much of what we do is fraud prevention. Our aims and actions have a direct link to Fraud...
Blog

How to Transition from Data Protection to Cyber Culture

The way we think about data protection is changing. Cyber culture is emerging as the new norm, and organizations must adapt their strategies to stay ahead of the curve. Data protection has traditionally focused on preventing breaches and protecting sensitive information. However, cyber culture goes beyond this by encompassing all aspects of online life. It includes everything...
Blog

How to Protect Against Identity Theft

Imagine waking up one day and the organizations you deal with – your bank, your workplace, the tax office, your educational institution – don’t recognize you as you. Sounds like science fiction, right? In its extreme version, it is. But versions of this story are playing out for people and organizations daily as incidences of identity theft occur more frequently around the...
Blog

Learn How Security Awareness Can Help Prevent Insider Threats in Your Organization

Actionable security awareness tips on how employees can prevent insider threats  A misplaced USB drive with confidential data. An opportunistic employee sharing confidential information with a competitor. An employee who accidentally clicks a phishing email. These are all examples of insider threats to your organization. Insider threats unfortunately are not simply the stuff...
Blog

This is Why You Need Mobile Responsive Security Awareness Training

(7 min read) Hint: It has everything to do with effective mobile learning. The past decade’s explosion of smartphone and tablet usage has magnified the importance of well-designed mobile responsive content as a vital part of any training program. Recent studies echo clear mobile learning preference statistics, including how: 70% of learners feel more motivated when training...
Blog

Cyber Security Breaches – Reduce The Human Risk Factor

You can have the most powerful, cutting-edge security technology in the world, but if a user clicks on the link in a malicious email, lets a stranger tailgate into your building or uses 1234 as their login password, they unwittingly open your organization up to a cyber security breach. The fact is that the human risk factor remains your greatest point of vulnerability when it...
Guide

The Human Fix To Human Risk

Discover the secret to making your employees your most robust defense against cyber attacks. Flip the narrative with The Human Fix to Human Risk.