Blog
How to Protect Your Data from the Microsoft Office 365 Phishing Scam
Fri, 07/31/2020
Since December 2019, there has been a coordinated campaign of phishing attempts targeting Office 365 users. Cyber criminals have sent spoofed email, gathering the login credentials and payment details of Microsoft accounts in over 62 countries.
According to one report, despite a 42% reduction in phishing attempts in 2019, scams like this Microsoft Office 365 campaign remain a...
Blog
What the Twitter Hack Revealed About Social Engineering
Thu, 07/23/2020
Less than a week ago, Twitter fell victim to a monumental security breach that saw hackers successfully orchestrate a social engineering attack and take over high-profile Twitter user accounts, including world-renowned companies like Apple and business magnates like Bill Gates and Elon Musk.
The cybercriminals used that access to launch a bitcoin scam that generated over $120...
Blog
Don’t Be Fooled By A Spoofing Attack
Tue, 05/26/2020
Know how to identify and prevent a spoofing attack
Spoofing attacks are the ultimate form of cybercriminal trickery and deception. Cybercriminals disguise themselves and rely on trust to steal confidential information, install ransomware, and commit other cybercrimes.
Spoofing comes down to trust. Cybercriminals hide behind trusted people, domains, URLs, and the technical...
Guide
Gamification for Cyber Security Awareness Training Success
Gamification gives employees relatable training that captures their interest and engages them to increase their motivation. When used as part of a cyber security awareness program – gamification takes learning to the next level.
Learn about:
How to best motivate and engage your users with your security awareness program
How gamification supports actionable learning
The...
Blog
Keep Your Employees Safe Online on Cyber Monday
Thu, 11/21/2019
Cyber Monday is right around the corner and this means employees will be shopping online at work. To prepare for the busiest online shopping day of the year, companies need to remind employees of how to be safe online.
It’s very easy for even the most cyber-aware employees to get caught up in the rush of online holiday sales and promotions. Retailers know that shoppers want...
On-Demand Webinar
On-Demand Webcast: The Five Stages of Being Phished
Mon, 11/18/2019
When falling for a phishing scam, users usually go through one or more emotional stages including; denial, anger, bargaining, depression and acceptance.
Watch now to learn more about:
The 5 stages and how they affect the impact of a data breach
Using a security awareness program to help users become cyber aware
The role of just-in-time training and phishing simulations in...
Blog
Tips to help employees be cyber safe at home and at the office
Wed, 10/16/2019
The lessons learned from cyber security training for employees must extend beyond the office doors. It’s important that employees understand that cyber security awareness matters at the office and at home.
We know that many people relax their cyber security practices when they’re using their home computers, laptops, and personal mobile devices. You want to give your staff,...
Blog
Why Gamify Security Awareness Training?
Fri, 08/30/2019
Leveraging a spirit of competition to drive engagement and create a security culture
Gamification is a popular concept these days, and for good reason. With gamification, you can develop a game for learning more about a serious topic while also getting the learner to approach winning that game with the same fervor they would when playing for entertainment. So what happens when...
Blog
5 Ways to Reduce the Risk of a Social Network Breach
Wed, 05/29/2019
Social networking overlaps corporate and personal lives, and so should the mission to create a culture of security awareness.
It’s true.
There was little – if nothing – any Facebook user could have done to prevent their passwords from getting exposed earlier this spring.
Just look at the facts of the case, said Theo Zafirakos, Chief Information Security Officer and Security...
Video
Ransomware: Move from Beware to Be Aware!
Tue, 12/04/2018
DURATION: 40 MINUTES
Do you fear that your organization’s data will be kidnapped and held for ransom?
It is critical for CISOs and security teams to have the right methods, tools and techniques to stop ransomware from infecting their environment. An effective approach goes beyond technology and processes—it needs to include the human factors that contribute to ransomware...
Blog
Cyber Security Breaches – Reduce The Human Risk Factor
Wed, 10/24/2018
You can have the most powerful, cutting-edge security technology in the world, but if a user clicks on the link in a malicious email, lets a stranger tailgate into your building or uses 1234 as their login password, they unwittingly open your organization up to a cyber security breach. The fact is that the human risk factor remains your greatest point of vulnerability when it...
Guide
The Human Fix To Human Risk
Discover the secret to making your employees your most robust defense against cyber attacks. Flip the narrative with The Human Fix to Human Risk.
Blog
Recent phishing attacks demonstrate widespread dangers
Tue, 11/24/2015
By this point, the dangers presented by phishing attacks are becoming increasingly well known. Business leaders recognize that information security awareness is critical for organizations of all kinds, and these programs need to focus heavily on phishing if firms want to remain protected in the current cybersecurity landscape.
Phishing attacks have become among the most...
Blog
Employee error leads to Rogers Communications data breach
Tue, 03/24/2015
While certainly not the biggest data breach in recent memory, this Rogers Communications incident demonstrates how a seemingly small employee error can have significant consequences in the realm of cybersecurity.
Data breaches have become major news topics and with good reason. These incidents have major implications not just for the businesses affected but also for their...
Identity Theft
Tue, 08/27/2013
Identity theft is not a new phenomenon, but has evolved with the advent of information technology. Nowadays, access to a large amount of information available on the Internet, the exploitation of IT or the use of various scams allow fraudsters to obtain private or confidential information about their victims in order to steal their identity and then commit malfeasance.
...
Blog
Cybersecurity for companies
Sun, 08/04/2013
In April 2013, the Canadian government announced its action plan for cybersecurity and highlighted the successes realized within the framework of its cybersecurity strategy to enhance cyberspace security for Canadians.
One such measure involves the Canadian Cyber Incident Response Center (CCIRC), which supports Public Safety Canada, acting as the national coordinating center...