Resources

Trial

Level Up Your Security Awareness with Cyber Games

83%1 of employees believe gamification motivates them to complete training These techniques, often associated with video games, have been proven to keep end users engaged with an immersive, enjoyable experience. When employees interact with gamified corporate training like Cyber Games, participation rates don’t take long to skyrocket. Score big points in the end user engagement department and...
Blog

Law 25: Everything You Need To Know to Ensure Compliance

Online privacy and data protection have become pressing issues in recent years that many governments have decided to legislate. The Legault CAQ government has been behind many digital-related innovations, so it’s not surprising to see legislation like this. This law is a legislative update since existing laws inadequately address digital data. It should be noted that Law 25 has teeth and isn’t...
Blog

How Security Leaders Can Use Multi-Factor Authentication to Protect Sensitive Data

As cyber criminals discover new ways to harvest login credentials, usernames and passwords have become less effective at keeping malicious users at bay. Research shows there are over 15 billion stolen login credentials on the dark web, which criminals routinely use to steal sensitive information from modern organizations. With such a high volume of data breaches and credential theft, the need to...
Blog

The Evolution and Limitations of Multi-Factor Authentication

As careers, banking, and healthcare move online, the need for more secure authentication has become increasingly urgent. While passwords have been adopted as the most common form of authentication, they pose many problems in terms of cyber security. In recent years, especially since the rise of remote work in 2019, the adoption of multi-factor authentication (MFA) has steadily risen to over 60%...
Blog

131 Cyber Security Statistics: 2024 Trends and Data

Cyber security awareness is an everyday job, and it’s easy to fall into a false sense of security once you have a solid plan in place. Every year, statistics are a reminder that hackers and scammers never sleep. New trends and attack types pop up daily, making it difficult to keep track. This list is a rundown of the most important statistics of the year, allowing you to get a good overview of...
Blog

Using Generative AI Responsibly: Exploring 5 Common Use Cases

The rise of generative AI like ChatGPT and Midjourney has been one of this decade’s most revolutionary technological advancements. This technology has allowed businesses to scale their operations more efficiently and enabled entirely new functionalities within existing tools. While generative AI has had a largely positive impact on the world, its negative aspects cannot be ignored. From text to...
Blog

11 Cyber Security Tips for the Holidays

E-commerce growth is expected to grow by 9.4% by 2024; by 2027, it’s forecasted to hit a whopping $8 trillion for the first time. More people shopping online means more opportunities for cyber criminals to strike. In fact, there’s a growing trend of cyber scams taking place during the holiday shopping spree. As we all get busy with our holiday shopping and preparations, keeping security in mind...
Blog

Protecting Retail Businesses from Cyber Attacks

Retail stores are one of the oldest ways humans exchange goods and services. As they evolve, one of the most significant shifts they have undergone is the dramatic increase in technology integration within their operations. From tools to check stock to staffing management and cash registers, retail stores rely heavily on technology for almost every aspect of their business. Unfortunately, all...
Blog

Is Your Email on Lockdown? Explaining Email Quarantine

Between 2022 and 2023, business email compromise (BEC) attacks rose by 55%. Furthermore, organizations that manage over 5,000 email accounts are 90% likely to receive at least one BEC attack weekly. Email is one of the most frequently used tools for both personal and professional communication. But with its convenience and accessibility also comes an onslaught of malicious threats that deliver...
Blog

Voice Generation AI: A Major Threat to Communication Carriers' Security Systems

Voice-based cyber attacks have existed for a long time and have wreaked havoc worldwide. They are a low-effort, high-reward attack that can be scaled to extreme heights with very little effort apart from finding phone number lists to call. This is part of the reason why vishing attacks have seen a 54% increase in 2022. A potentially even more aggravating factor is the recent drastic improvements...
Blog

How to Avoid Phishing Simulations False Positives?

This year is seeing more phishing attacks in more places, having more detrimental impacts. One security messaging provider noted a 61% increase in phishing attacks between April and October 2022 compared to the same period the previous year. Another report observed that when phishing attacks were successful in 2022, financial losses from those incidents increased by 76%. In another trend,...
Guide

2023 Phishing Benchmark Global Report

Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Blog

How to Develop Security Awareness Training

According to Valimail’s Spring 2019 Email Fraud Landscape, about 3.4 billion phishing emails are sent each day, making it one of the most common types of cyber attacks. This number shows how crucial it is to train your employees so they can recognize and report malicious emails. That’s where cyber security awareness training comes in. With the right training program, you can provide your...
Blog

8 Examples of Vishing and How to Beat Them

Less of a cyber security threat and closer to a scam, Vishing refers to attempts to steal information or money over the phone by convincing the victim. These calls often use personal data acquired through previous cyber attacks to gain their victim’s trust. This type of threat is definitely on the rise—especially with the help of AI. Like many other hacks and scams, Vishing is a popular attack...
Blog

What to Expect From Gone Phishing Tournament 2023

Every year, phishing statistics seem to get worse. The year 2022 witnessed over 4.7 million attacks, with a significant surge occurring in Q4, accounting for 1.35 million of those incidents. This trend indicates a steady annual growth rate of 150% since 2019. There is no doubt that phishing is the leading and most dangerous modern cyber attack. Recognizing these challenges, Fortra’s Terranova...
Blog

Here's How Abandoned Domain Name Can Become a Cyber Threat

Do you have old pages on your website that you’ve forgotten about? Obsolete projects with old domain names? Old pages that are no longer active? If so, beware. Those subdomains you’ve forgotten about can be highly valuable to cyber attackers. Keeping your organization’s website up-to-date typically means updating content. But while you focus on the new, don’t neglect any old domains or unused...
Blog

Updated FCC Legislation Could Mean New Data Privacy Requirements for Telecoms

Telecommunications companies (telecoms) have been prime targets for cyber attackers. They operate critical infrastructure passage, and vast amounts of customer data pass through their networks. The United States Federal Communications Commission (FCC) is aiming to strengthen data security with new regulations around data breach reporting by communications carriers. The agency has long required...
Blog

Cyber Security Preparedness in a Hybrid World

Offices around the world have undergone a massive transformation in recent years. While a fully remote workforce remains offered by a minority of employers, the hybrid nature of workplaces is rapidly becoming the norm. A recent study by Cisco studied the cyber security challenges tied to a distributed workforce, and their cyber security readiness model created some troubling statistics. According...
Blog

Why Is Phishing Awareness Training Important?

The reality is simple. Phishing attacks are more prevalent than ever before. An estimated 3.4 billion fraudulent emails are sent out daily as part of phishing schemes, resulting in the FBI's Internet Crime Complaint Center (IC3) receiving over 651,800 phishing-related complaints annually. Adjusted losses for affected organizations topped $2.4 billion, costing them losses of up to $17,700 per...
Blog

How to Report a Phishing Email Scam: What You Need to Know

Over 3.4 billion phishing emails are sent out to unsuspecting recipients daily. At this rate, over 1 trillion email scams are deployed in one calendar year. The sheer enormity of these numbers makes it easier to understand how and why employees become victims of phishing email scams. Their typical email inbox is overflowing with emails from colleagues, partners, friends, family, third-party...