Resources

On-Demand Webinar

Five Steps To Set Up A Cyber Security Ambassador Program

DURATION: 1 HOUR The responsibilities of today’s security awareness leaders are expanding and growing in complexity. They are expected to safeguard their organizations and reduce human risk with limited resources. Good news – They don’t have to do it alone! During this session you will learn: How to leverage a cyber security ambassador program to instill a security culture, change behavior and...
Blog

Why Gamify Security Awareness Training?

Leveraging a spirit of competition to drive engagement and create a security culture Gamification is a popular concept these days, and for good reason. With gamification, you can develop a game for learning more about a serious topic while also getting the learner to approach winning that game with the same fervor they would when playing for entertainment. So what happens when you integrate...
Blog

The Nine Elements Impacting Cybersecurity Awareness

The MINDSPACE framework: What factors influence human behavior? Even when your company has the best technology and the most efficient security controls, it still has to invest in the human factor. Regardless of the methods a company adopts, nothing can be accomplished unless users of the technology are motivated and able to apply the methods effectively. According to a recent study , a...
blog

How to Implement a Security Awareness Ambassador Program in 5 Steps

Build your team of Cyber Heroes Imagine your organization is being hit with a phishing attack, one of the most common cyber security threats users face today. In an organization with weak cyber security culture, users might see the phishing attempt, quickly disregard it and move on about their day feeling like it’s not their problem. “They click on a link and then feel like it’s someone else’s...
On-Demand Webinar

How to Succeed In Cyber Security Awareness

During this webcast, you will learn how to effectively implement a cyber security awareness program that will generate measurable results. Watch the webcast and start optimizing your cyber security awareness program now! During the webcast, learn more about: Tips and guidelines on how to implement a successful and measurable cyber security awareness program. A proven methodology, based on more...
Press Release

Terranova Recognized as a Leader in the 2018 Gartner Magic Quadrant for Security Awareness CBT

Gartner has named Terranova a Leader in the Magic Quadrant for Security Awareness computer-based training! We are very pleased to see that Gartner has recognized us based on what we feel is the significant work that we have done to execute on our vision and demonstrate leadership in the market. The Security Awareness Training market is characterized by a relatively low barrier to entry. While it...
On-Demand Webinar

The Human Fix to Human Risk

DURATION: 30 MINUTES During this webcast, learn how the proven Security Awareness 5-Step Framework is leveraged by organizations globally for raising security awareness effectively. We will walk you through every detail you need to consider in order to plan and deliver a successful awareness program. The framework incorporates several tried and true techniques for changing human behavior and built...
Blog

Employee Engagement - Raising Motivation for Cyber Security Awareness

We know that the human factor and employee engagement are critical when talking about raising cyber security awareness . You’ve invested a lot in technologies or highly sophisticated processes, but your employees will still be the last line of defense in thwarting a cyberattack. On the other hand, they’re the ones who are hardest to mobilize! In 2017, a major study was conducted among...
Blog

Password Safety - Empower Your Workforce To Protect Sensitive Data

Make Your Passwords Secure Again! In connection with the most recent security breaches, let's take a few minutes to highlight the importance of talking with your employees about password safety. Cyber criminals strive to infiltrate our networks and weak passwords are a way in. Empowering your employees with cyber security awareness training is an excellent way to teach best practices for password...
Blog

A Security Awareness State of Mind In 5 Steps

Security Awareness Professionals! This Is Day 3 of Gartner Security and Risk Management Summit 2018. Join Terranova at booth 119! We have been exchanging numerous ideas with participants about raising security awareness effectively and user training initiatives. Consequently, we are focusing our discussion on security awareness. We ask the following question: “How do you measure employees’...
Blog

Overcome the Security Awareness Blues Analyze Needs. Plan Early.

Without awareness, there is no security. Truly an inseparable pair! This is Day 4 of RSA Conference 2018 , and the Terranova team has been engaging in some interesting conversations. You have expressed views and concerns regarding Information Security Awareness (ISA). And we are taking notes! The article that follows discusses the first phases of implementation of a security awareness program...
Blog

A Comprehensive Guide on Learning Management Systems

The secret for continuous growth is to strive for success through effective learning opportunities and employee engagement. Organizing educational content for your business has its challenges, especially when priorities are not arranged efficiently. From compliance to learner validation and user experience, any number of factors can make or break your business’ learning efforts. When aiming for...
blog

Terranova is once again recognized as a leader in Gartner’s Magic Quadrant

Gartner has recognized Terranova WW Corporation among the leaders in its 2016 Magic Quadrant for Security Awareness Computer-Based Training. “We are proud to have been recognized by Gartner again this year,” said Terranova President Lise Lapointe. “We believe this position solidifies our status as a world leading provider in information security awareness solutions.” Widely regarded as THE global...
Blog

Employee error leads to Rogers Communications data breach

While certainly not the biggest data breach in recent memory, this Rogers Communications incident demonstrates how a seemingly small employee error can have significant consequences in the realm of cybersecurity. Data breaches have become major news topics and with good reason. These incidents have major implications not just for the businesses affected but also for their employees, their...
Blog

Risk of data breaches, cybercrime growing in Latin America

Latin American companies need to increase their investment in cybersecurity, including security awareness training for employees. Data breaches and cybercrime used to be seen as shocking, alarming and difficult to fathom. Today, they seem almost run of the mill. The world and many of its criminals have gone digital, and yet countless organizations have yet to embrace new strategies that can...
Blog

Impending breach notification laws highlight importance of security awareness

New data breach notification proposals from President Obama and other political leaders will only exacerbate the impact of these incidents. The stakes surrounding cybersecurity aren’t just increasing – they are expanding. For years now, business leaders have understood that data breaches are a serious issue, one which firms must do everything in their power to avoid. After all, these incidents can...
Blog

Cybersecurity for companies

In April 2013, the Canadian government announced its action plan for cybersecurity and highlighted the successes realized within the framework of its cybersecurity strategy to enhance cyberspace security for Canadians. One such measure involves the Canadian Cyber Incident Response Center (CCIRC), which supports Public Safety Canada, acting as the national coordinating center for cybersecurity...
Blog

Business Continuity Management (BCM)

The business continuity management program (BCM) covers the prevention, response and organization of actions required after an event which could significantly disrupt business operations. This ongoing program is more than an IT recovery plan. Here are the steps and components of a BCM, their relationships and the winning conditions necessary to implement such a program within a company. Governance...
Blog

Supplementary guide to achieving PCI-DSS compliance cloud computing

Cloud computing services require special attention in regards to information security and privacy. This is especially important when using credit card data while cloud computing in order to meet PCI-DSS ("Payment Card Industry – Data Security Standard") standards. To this end, the SSC ("Standard Security Council") published a document entitled “Information Supplement: PCI DSS Cloud Computing...
Blog

Secure Behavior in the Office

Nowadays, information security is a very common term used in the business world. Previously, security was simply a matter of installing a firewall to protect a corporate network by adding barriers to prevent intruders from access it. In the last few years, information has become electronic, or should I say virtual, in its primary form. What used to be on hard copy or paper form is now stored...