Blog
130 Cyber Security Statistics: 2024 Trends and Data
Mon, 08/12/2024
Cybersecurity awareness is an everyday job, and it’s easy to fall into a false sense of security once you have a solid plan in place. Every year, statistics are a reminder that hackers and scammers never sleep. New trends and attack types pop up daily, making it difficult to keep track.This list is a rundown of the most important statistics of the year, providing a good overview of threats to keep...
On-Demand Webinar
Understanding Real-World Social Engineering Threats
Social engineering is a major cybersecurity threat, targeting the most unpredictable element of any security system: people.Unlike attacks that exploit technical vulnerabilities, social engineering preys on human psychology, tricking individuals into compromising their organization's defenses.In this webinar, Sean Bell, Sr. Solutions Engineer at Fortra, covers:How attackers craft convincing and...
On-Demand Webinar
Navigating the Cyber Threat Landscape with a Human-Centric Approach
Enhance your email security strategy with expert insights from Ravisha Chugh, a former Gartner analyst and current Product Marketing Lead at Fortra. In this webinar recording, you'll learn:What It Means to Have a Human-Centric Approach in Email Security: Understand the importance of focusing on the human element.Top Email Security Threats: Identify and counter Business Email Compromise (BEC),...
Blog
What is Quishing?
Fri, 02/09/2024
QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives.
The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes, easily generated and cost...
Blog
Protecting Retail Businesses from Cyber Attacks
Fri, 11/24/2023
Retail stores are one of the oldest ways humans exchange goods and services. As they evolve, one of the most significant shifts they have undergone is the dramatic increase in technology integration within their operations.
From tools to check stock to staffing management and cash registers, retail stores rely heavily on technology for almost every aspect of their business. Unfortunately, all...
Blog
Android vs iOS: Which Operating System is Safer?
Mon, 07/10/2023
Cellphones have seen one of the most dramatic technological growths of any hardware in recent history. From simple portable phones a few decades ago, they’ve become fully-fledged computers with their own OS and applications used daily by most people worldwide.
Smartphones have become such a fixture of life, and hackers and scammers have been working to exploit these devices for personal gain....
Case Study
Canadian University Reduces Data Breach Potential And Strengthens Security Culture Through An Effective Awareness Training Program
Learn how a recognized Canadian university obtained a training participation rate of over 42% with the help of engaging security awareness content.
Blog
The Security Risks of Improper Employee Offboarding and How to Prevent It
Fri, 03/17/2023
Employees come and go for a variety of reasons. If you’re lucky, they’ll be very cooperative with the offboarding process, but this isn’t always the case. And even if they are, you still have to take it with a grain of salt. Some say that calm and cooperative offboarding is often the most dangerous because people aren’t as diligent when the situation seems lax.
If these moments have any...
Blog
Got Malware? The Risk of Buying This Smart ID Card Reader from Amazon
Wed, 01/18/2023
KrebsOnSecurity blog recently reported on a popular, low-cost Common Access Card (CAC) reader available on Amazon that came with drivers infected by malware.
A compromised smart ID card reader can bring severe consequences to both government and private organizations. It gives hackers an easy backdoor means of infiltrating networks and systems, which can leave sensitive information vulnerable...
Blog
How to Transition from Data Protection to Cyber Culture
Wed, 12/28/2022
The way we think about data protection is changing. Cyber culture is emerging as the new norm, and organizations must adapt their strategies to stay ahead of the curve.
Data protection has traditionally focused on preventing breaches and protecting sensitive information. However, cyber culture goes beyond this by encompassing all aspects of online life. It includes everything from how we interact...
Blog
How to Protect Your Sensitive Information from Word Document Malware
Tue, 12/27/2022
If you’re a company that uses email scanning technology as the first line of cyber defense, you should know about a recent slate of malicious Word document-based attacks.
These attacks are designed to deliver malware and ransomware to targeted systems.
Security researchers at Cisco Talos recently identified an attack where Word document files attached to emails were used to deliver Cobalt Strike...
Blog
Top Examples of Malware Attacks
Wed, 03/02/2022
Malware is perhaps the most widely known out of all IT security threats. Since 1986, malware has become a significant concern for enterprise users, with recent examples including the Colonial Pipeline attack, Kaseya ransomware attack, and the SolarWinds Dark Halo breach.
However, these attacks are just the tip of the iceberg, with many businesses falling victim to malware and ransomware attacks...
Blog
Learn How Security Awareness Can Help Prevent Insider Threats in Your Organization
Tue, 12/08/2020
Actionable security awareness tips on how employees can prevent insider threats
A misplaced USB drive with confidential data. An opportunistic employee sharing confidential information with a competitor. An employee who accidentally clicks a phishing email. These are all examples of insider threats to your organization.
Insider threats unfortunately are not simply the stuff of movies and crime...
Blog
This is Why You Need Mobile Responsive Security Awareness Training
Tue, 06/30/2020
(7 min read)
Hint: It has everything to do with effective mobile learning.
The past decade’s explosion of smartphone and tablet usage has magnified the importance of well-designed mobile responsive content as a vital part of any training program. Recent studies echo clear mobile learning preference statistics, including how:
70% of learners feel more motivated when training on a mobile device...
Blog
Cyber Security Breaches – Reduce The Human Risk Factor
Wed, 10/24/2018
You can have the most powerful, cutting-edge security technology in the world, but if a user clicks on the link in a malicious email, lets a stranger tailgate into your building or uses 1234 as their login password, they unwittingly open your organization up to a cyber security breach. The fact is that the human risk factor remains your greatest point of vulnerability when it comes to cyber...
Guide
The Human Fix To Human Risk
Discover the secret to making your employees your most robust defense against cyber attacks. Flip the narrative with The Human Fix to Human Risk.