Blog
Securing Your Organization’s Reputation from Brand Impersonation Attacks
Fri, 08/09/2024
Phishing attacks are becoming increasingly sophisticated. Over 51% of the time, email attackers pretend to be one of the top 20 global brands, with Microsoft being the most common impersonation.Picture this: one of your users receives an email that appears to be from a trusted partner or a commonly used service. The branding is accurate, the language is convincing, and the email seems legitimate....
Blog
How to Successfully Manage Repeat Clickers
Tue, 06/25/2024
Managing repeat clickers is critical to maintaining robust organizational security, as these individuals significantly increase the risk of successful phishing attacks.According to a recent analysis of 6,000 employees receiving simulated phishing emails, about 6% of users were responsible for approximately 29% of the failures.Recognizing this could help maximize the return on investment (ROI) of...
Blog
Top 11 Cybersecurity Concerns in the Finance Sector in 2024
Wed, 06/12/2024
Cybersecurity in finance is not just about defense but proactive adaptation. Banks face continuous threats despite advanced security infrastructures. The escalation in phishing success rates, as seen in Terranova Security's 2023 Gone Phishing Tournament found a 10.4% click-through statistic, highlighting the need for evolving security strategies.
While the finance sector performed better than...
Blog
DMARC: The Next Step in Email Hygiene and Security
Tue, 05/07/2024
In 1971, Ray Tomlison developed the first email service while working at The Defense Advanced Research Projects Agency (DARPA). This development changed how we communicated. However, even though this was an exceptional tool, it was not very user-friendly, requiring users to have specific software installed on their computers.In 1996, Sabeer Bhatia...
On-Demand Webinar
2023 Gone Phishing Tournament Results Webinar
Watch the panel discussion break down the latest phishing statistics from the 2023 Gone Phishing Tournament and learn how to leverage them to help your organization strengthen security awareness initiatives.
Blog
What is Baiting in Cyber Security?
Mon, 03/04/2024
Cyber criminals are constantly evolving their methods, but their biggest leverage for growth will always be exploiting the human factor. Software and physical measures against cyber attacks have become so advanced that tricking workers is the only remaining attack vector criminals can reliably use.
According to Verizon’s 2023 Data Breach Report, 74...
Datasheet
Phishing Training for Microsoft 365 E5 Customers
Terranova Security’s phishing training content topics include (but are not limited to):
Information Security Awareness Topics
Business email compromise
Email
Identity Theft
Introduction to information Security
Malware
Phishing
Ransomware
Social Engineering
Microlearning Library
Business email compromised (BEC)
C-Level Email Impersonation
Handling Unidentified Individuals
Mass...
Datasheet
Upgrade Security Awareness with Microsoft 365 and Terranova Security
Diverse Training for Global Teams
Offering courses in major languages, extending a total of 40+, to meet the diverse needs of global workforces, ensuring consistent security practices across all regions.
Metrics That Matter
Use the Security Awareness Index to pinpoint your high-risk users and clearly define your cybersecurity training outcomes with measurable, data-driven results.
...
Blog
What is Quishing?
Fri, 02/09/2024
QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives.
The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes, easily generated and cost...
Blog
How Secure is Cloud Storage? Here are the Important Risks to Know
Fri, 12/29/2023
The rise of cloud storage has enabled much of the rapid digital transformation people have experienced since the onset of the pandemic. Forecasts project that today’s $83.41 billion global market will explode to $376.37 billion by 2029.
While cloud storage opens many opportunities to streamline processes and productivity, let’s keep in mind the arduous risks it poses.
Skyhigh Security found that...
Blog
How to Avoid Phishing Simulations False Positives?
Fri, 11/03/2023
This year is seeing more phishing attacks in more places, having more detrimental impacts. One security messaging provider noted a 61% increase in phishing attacks between April and October 2022 compared to the same period the previous year.
Another report observed that when phishing attacks were successful in 2022, financial losses from those incidents increased by 76%.
In another trend,...
Blog
What Organizations Can Learn from the Toyota Cloud Breach
Mon, 09/25/2023
Cloud storage has revolutionized how organizations collaborate internally, allowing them to store data conveniently and cheaper than ever.
According to a recent survey of technology leaders, 93% of respondents said their company was “mostly cloud,” reflecting the hold that this technology has on all industries.
The auto industry has recently integrated cloud storage at all levels of their...
Case Study
Worldwide Manufacturer Creates Cyber-Aware Culture And Prevents Phishing Attacks With Security Awareness Training
Learn how a global manufacturing company shrunk its phishing email click rates by more than 20% after implementing security awareness training.
Blog
March 2023 Marks the 19th Anniversary of Fraud Prevention Month in Canada
Mon, 03/13/2023
March is Fraud Prevention Month, and Terranova Security wants to take this opportunity to emphasize the importance of raising awareness on information security best practices.
Let’s stop online fraud in its tracks.
As security professionals focused on Information Security Awareness (ISA), much of what we do is fraud prevention. Our aims and actions have a direct link to Fraud Prevention Month,...
Blog
How to Protect Your Sensitive Information from Word Document Malware
Tue, 12/27/2022
If you’re a company that uses email scanning technology as the first line of cyber defense, you should know about a recent slate of malicious Word document-based attacks.
These attacks are designed to deliver malware and ransomware to targeted systems.
Security researchers at Cisco Talos recently identified an attack where Word document files attached to emails were used to deliver Cobalt Strike...
Blog
How to Build a Successful Phishing Simulation Campaign
Thu, 02/24/2022
Phishing threats are everywhere, and if your employees don’t know how to spot them, you’re putting your information at risk. Knowing how to build a successful phishing simulation is vital for identifying how well employees can spot the latest threats and ensuring they know how to spot them independently.
Unfortunately, many organizations fail to offer adequate security awareness training, with...
Blog
How to Protect Against Identity Theft
Thu, 02/25/2021
Imagine waking up one day and the organizations you deal with – your bank, your workplace, the tax office, your educational institution – don’t recognize you as you. Sounds like science fiction, right? In its extreme version, it is. But versions of this story are playing out for people and organizations daily as incidences of identity theft occur more frequently around the world.
In 2022, the...
Blog
What You Need to Know About The Office-365 Phishing Campaign Targeting C-Suite Executives
Fri, 02/12/2021
During the last week of January 2021, cyber security provider TrendMicro shared a blog post highlighting an Office-365 phishing campaign that criminals have targeted executives within manufacturing, tech, real estate, government, and finance since May 2020. As part of the scam, fraudsters sent the victims fake emails with links to a phishing site, where they harvested their credentials to sell...
Blog
The 2020 Security Awareness Virtual Summit for Partners: Here’s What You Need to Know
Mon, 10/26/2020
Robust, engaging security awareness training is an essential part of strong cyber security practices, especially given the accelerated digital transformation and shift by many organizations to remote workforces.
It can also be a crucial value-added product for resellers, distributors, MSSPs, OEMs partners and technology partners, who are looking to expand their portfolio, drive business growth...