Resources

Blog

Why Your Third-Party Vendors Have Almost Definitely Been Breached and What to Do About It

The news from Human Resources is that employees are happier than ever. Working from home using third-party vendor services makes work easier and more flexible. The news from IT is less enthusiastic. A recent report showed that a whopping 98% of organizations have at least one third-party provider that has suffered a data breach in the last two years. Third-party vendor...
Blog

Becoming a Cybersecurity Pro: The 10 Qualities You Need to Succeed

Cyber security is one of the fastest-growing fields in technology, and with the number of cyber attacks increasing every year, it’s no wonder why it’s also one of the fields hiring the most. Nowadays, almost every company needs a cyber security department to protect its data from hackers and scammers. Cybercrime magazine estimates there will be over 3.5 million cyber security...
Blog

Gift Card Scams: How to Easily Spot and Avoid These Cyber Threats

Did you know that gift card scams are among the most popular cyber threats? The same things that make gift cards popular with consumers—convenience and ease of use—also make them attractive to scammers as a vehicle for fraud. Gift cards, also known as gift certificates or vouchers, have topped the list of reported fraud payment methods every year since 2018, according to the...
Guide

From Data Protection to Cyber Culture

Using security awareness training to build strong cyber security into your organizational culture is crucial to keep sensitive information safe. But is your awareness training program resonating with employees? Terranova Security, in collaboration with recognized research firm IPSOS, answer this question and many more in this new report that truly reflects employee attitudes...
Blog

What are Email Security Gateways and Why are They Important?

Whether deployed as a cloud service or on-premises, email security—and especially email security gateways—is of growing importance to organizations of all sizes, particularly given the upheavals to the working world over the last several years. It is estimated that in the post-pandemic world, one quarter of the workforce will choose to permanently work remote. In some sectors,...

5 Ways to Be Prepared for QR Code Scams

Restaurant menus worldwide have been replaced by QR codes stuck to the table during the COVID-19 pandemic. Physical menus were judged too difficult to clean and could act as infection vectors. Since everyone has a smartphone nowadays, QR codes were attractive alternatives instead of asking clients to type in the restaurant’s URL on their phones. Before, QR codes were mainly...
Blog

What You Need to Know About the Kaseya Ransomware Outbreak

In early July, IT solutions provider and remote management solution provider Kaseya announced that it had fallen victim to a supply chain ransomware attack. During the attack, hackers leveraged a vulnerability in Kaseya’s VSA platform to encrypt the data of hundreds of downstream MSPs and their clients. The Kaseya ransomware outbreak is one of the latest high-profile...
Blog

How to Stop Your Employees Falling Victim to Shipping Notification Scams this Holiday Season

With Black Friday, Cyber Monday, Thanksgiving, and the Christmas holidays fast approaching, cyber criminals are working round the clock to create new scams, such as the shipping notification scam, to phish for private information and commit identity fraud. As many employees will be shopping online during working hours, cyber security leaders need to educate employees on...
Blog

7 Cyber Security Tips for Retailers

The holiday shopping season presents a target-rich environment for cybercriminals. In fact, as per the 2020 Trustwave Global Security Report, the retail industry is the most targeted sector for cyber attacks for the third year running. An increasing shift to a digital environment—a change due in no small part to the COVID-19 pandemic—isn’t making data protection easier for...
Blog

Examining The 2020 Healthcare Ransomware Surge

How to Protect Against Ryuk Ransomware As countries worldwide struggle to come to grips with the Covid-19 pandemic, attackers have attempted to capitalize by launching a wave of ransomware attacks on hospitals across the U.S. and Canada. These attacks have taken place in locations ranging from New York, Nebraska, Ohio, Missouri, and Michigan, to Montreal, by using Ryuk...
Video

Ransomware: Move from Beware to Be Aware!

DURATION: 40 MINUTES Do you fear that your organization’s data will be kidnapped and held for ransom? It is critical for CISOs and security teams to have the right methods, tools and techniques to stop ransomware from infecting their environment. An effective approach goes beyond technology and processes—it needs to include the human factors that contribute to ransomware...
Blog

Scam by fraudsters – Ransomware

Ransomware is one the many scams that Internet users dread. Once this type of malicious program is installed, it asks the user for “ransom” to unlock the computer, using various pretexts and pretending to be a local police authority. In one case, a user clicked on a malicious link and was bombarded with pornographic pop-ups. The user attempted to restart his computer, when he...
Blog

Secure information destruction

What is the value of the information stored on your computer equipment or paper documents? What would the impacts be if your personal or confidential information fell into the wrong hands (e.g. financial loss, loss of image / reputation, regulatory or legal non-compliance)? Can you be certain that a proper destruction method was used on the information (whether in digital or...