Blog
19 Phishing Email Examples
Mon, 08/19/2024
Phishing attacks work because people don’t know what phishing looks like. These examples of phishing emails emphasize how easy it is to be tricked.
Blog
130 Cyber Security Statistics: 2024 Trends and Data
Mon, 08/12/2024
Cybersecurity awareness is an everyday job, and it’s easy to fall into a false sense of security once you have a solid plan in place. Every year, statistics are a reminder that hackers and scammers never sleep. New trends and attack types pop up daily, making it difficult to keep track.This list is a rundown of the most important statistics of the year, providing a good overview of threats to keep...
Blog
DMARC: The Next Step in Email Hygiene and Security
Tue, 05/07/2024
In 1971, Ray Tomlison developed the first email service while working at The Defense Advanced Research Projects Agency (DARPA). This development changed how we communicated. However, even though this was an exceptional tool, it was not very user-friendly, requiring users to have specific software installed on their computers.In 1996, Sabeer Bhatia...
Blog
7 Examples of Social Media Scams You Should Avoid at All Costs
Fri, 04/05/2024
Social media platforms have become non-negotiables in our daily lives. We always find ourselves online at our favorite social media sites to connect with loved ones, share our thoughts, and discover interesting content.
While social media has become central to our routines, its vast reach and anonymity provide certain risks—they’ve become a...
On-Demand Webinar
2023 Gone Phishing Tournament Results Webinar
Watch the panel discussion break down the latest phishing statistics from the 2023 Gone Phishing Tournament and learn how to leverage them to help your organization strengthen security awareness initiatives.
Blog
Pig Butchering Scam – What It Is and How to Protect Yourself
Mon, 03/25/2024
Cyber threats are constantly evolving, and the most recent evolution of phishing scams is proving particularly effective. Boasting a gruesome name, pig butchering is a cyber threat that reels in victims and steals thousands, sometimes millions of dollars.
Pig butchering has quickly become one of the most lucrative scams thanks to a mix of post...
Blog
Are Password Managers Safe to Use?
Mon, 03/18/2024
Passwords have become a cornerstone of the Internet. These strings of letters and numbers allow us to validate access to various communities, online tools, healthcare, banking, and more. As more and more information is stored behind passwords, efforts to steal and crack them have vastly increased.
These new cyber threats led to the creation of...
Blog
7 Smishing Examples and How to Protect Yourself
Fri, 03/01/2024
With roughly 5 billion people—a whopping 65% of the global population—sending and receiving SMS messages, it’s no wonder that hackers have taken to SMS as a new way to lead cyber attacks.
In 2022, 68.4 million Americans fell victim to a phone scam. And only 65% of Americans say they would delete a text if it came from an unknown sender. With these...
Blog
The 2023 Gone Phishing Tournament Results: Everything You Need to Know
Tue, 02/20/2024
The results of Fortra’s Gone Phishing Tournament are here, and they highlight the potential power and danger of phishing across the world.
This global test uncovered that 1 in 10 individuals are susceptible to these attacks, which would have led to 90,000 compromised passwords if the campaign had been an actual cyber attack.
This year’s tournament featured an updated email and landing page to...
Blog
Protect your loved ones from phishing, social engineering and other cyber attacks
Tue, 02/13/2024
Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing, vishing, smishing, and social engineering.
Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of an attractive and...
Blog
Swipe Right on Cyber Security: Let’s Talk About Zodiac Signs
Mon, 02/12/2024
With Valentine’s Day upon us, our thoughts turn to love, compatibility, and cyber security.
As Cupid strings his bow this Valentine’s Day, let’s explore how the stars might be influencing your approach to online security. Are you a Leo who roars against cyber threats, or a Pisces swimming through the sea of digital privacy?
Remember, while the universe might hold many mysteries, your cyber...
Datasheet
Phishing Training for Microsoft 365 E5 Customers
Terranova Security’s phishing training content topics include (but are not limited to):
Information Security Awareness Topics
Business email compromise
Email
Identity Theft
Introduction to information Security
Malware
Phishing
Ransomware
Social Engineering
Microlearning Library
Business email compromised (BEC)
C-Level Email Impersonation
Handling Unidentified Individuals
Mass...
Datasheet
Upgrade Security Awareness with Microsoft 365 and Terranova Security
Diverse Training for Global Teams
Offering courses in major languages, extending a total of 40+, to meet the diverse needs of global workforces, ensuring consistent security practices across all regions.
Metrics That Matter
Use the Security Awareness Index to pinpoint your high-risk users and clearly define your cybersecurity training outcomes with measurable, data-driven results.
...
Blog
What is Quishing?
Fri, 02/09/2024
QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives.
The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes, easily generated and cost...
Blog
Safer Internet Day 2024: Keeping Everyone Safe and Secure Online
Mon, 02/05/2024
On February 6, 2024, we will celebrate Safer Internet Day with learning events dedicated to inspiring change and highlighting the importance of online safety. This year, we can expect activities from organizational and industry supporters, schools and government agencies, community groups, and business leaders.
With cyber security risks rising, Safer Internet Day is an opportunity to raise...
Blog
The 7 Most Dangerous Healthcare Cyber Attacks
Fri, 02/02/2024
While industries like banking and software can be devastated by cyber attacks, no other field is impacted by hackers like healthcare.
As an example, it’s hard to forget attacks like the ransomware that brought all 400 locations of Universal Health Services to a standstill for months in the United States. Healthcare facilities often can’t operate if they don’t have access to crucial information...
Blog
Law 25: Everything You Need To Know to Ensure Compliance
Fri, 01/26/2024
Online privacy and data protection have become pressing issues in recent years that many governments have decided to legislate. The Legault CAQ government has been behind many digital-related innovations, so it’s not surprising to see legislation like this.
This law is a legislative update since existing laws inadequately address digital data. It should be noted that Law 25 has teeth and isn’t...
Blog
The Evolution and Limitations of Multi-Factor Authentication
Mon, 01/22/2024
As careers, banking, and healthcare move online, the need for more secure authentication has become increasingly urgent. While passwords have been adopted as the most common form of authentication, they pose many problems in terms of cyber security.
In recent years, especially since the rise of remote work in 2019, the adoption of multi-factor authentication (MFA) has steadily risen to over 60%...
Blog
How Secure is Cloud Storage? Here are the Important Risks to Know
Fri, 12/29/2023
The rise of cloud storage has enabled much of the rapid digital transformation people have experienced since the onset of the pandemic. Forecasts project that today’s $83.41 billion global market will explode to $376.37 billion by 2029.
While cloud storage opens many opportunities to streamline processes and productivity, let’s keep in mind the arduous risks it poses.
Skyhigh Security found that...