On-Demand Webinar
Understanding Real-World Social Engineering Threats
Social engineering is a major cybersecurity threat, targeting the most unpredictable element of any security system: people.Unlike attacks that exploit technical vulnerabilities, social engineering preys on human psychology, tricking individuals into compromising their organization's defenses.In this webinar, Sean Bell, Sr. Solutions Engineer at Fortra, covers:How attackers craft convincing and...
On-Demand Webinar
Navigating the Cyber Threat Landscape with a Human-Centric Approach
Enhance your email security strategy with expert insights from Ravisha Chugh, a former Gartner analyst and current Product Marketing Lead at Fortra. In this webinar recording, you'll learn:What It Means to Have a Human-Centric Approach in Email Security: Understand the importance of focusing on the human element.Top Email Security Threats: Identify and counter Business Email Compromise (BEC),...
Blog
7 Examples of Social Media Scams You Should Avoid at All Costs
Fri, 04/05/2024
Social media platforms have become non-negotiables in our daily lives. We always find ourselves online at our favorite social media sites to connect with loved ones, share our thoughts, and discover interesting content.
While social media has become central to our routines, its vast reach and anonymity provide certain risks—they’ve become a...
Blog
Are Password Managers Safe to Use?
Mon, 03/18/2024
Passwords have become a cornerstone of the Internet. These strings of letters and numbers allow us to validate access to various communities, online tools, healthcare, banking, and more. As more and more information is stored behind passwords, efforts to steal and crack them have vastly increased.
These new cyber threats led to the creation of...
Blog
Protect your loved ones from phishing, social engineering and other cyber attacks
Tue, 02/13/2024
Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing, vishing, smishing, and social engineering.
Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of an attractive and...
Blog
Top 5 Data Security Incidents of 2023 and Predictions for 2024
Mon, 12/25/2023
As 2023 comes to an end, one thing is certain: cyber security is still a prime concern for most companies. While industries like healthcare and retail are still more heavily impacted than any other, a concerning trend has emerged in regard to the variety of organizations being targeted by cyber criminals.
This variety accounted for a staggering 20% increase in data breaches compared to 2022. More...
Blog
The Most Important Cyber Security Trends of 2024
Mon, 12/18/2023
It’s likely that you won’t be surprised that cyber security experts will need to step up their game in 2024. Last year’s events have shown us that education is key and that vigilance is essential.
While we learned a lot in 2022, we also had new issues to deal with. Remote work caused 88% of businesses to feel that they are facing “challenges to effective cyber security measures for remote workers...
Blog
Is Your Email on Lockdown? Explaining Email Quarantine
Mon, 11/20/2023
Between 2022 and 2023, business email compromise (BEC) attacks rose by 55%. Furthermore, organizations that manage over 5,000 email accounts are 90% likely to receive at least one BEC attack weekly.
Email is one of the most frequently used tools for both personal and professional communication. But with its convenience and accessibility also comes an onslaught of malicious threats that deliver...
Blog
8 Examples of Vishing and How to Beat Them
Mon, 10/02/2023
Less of a cyber security threat and closer to a scam, Vishing refers to attempts to steal information or money over the phone by convincing the victim. These calls often use personal data acquired through previous cyber attacks to gain their victim’s trust.
This type of threat is definitely on the rise—especially with the help of AI. Like many other hacks and scams, Vishing is a popular attack...
Blog
Cyber Security Burnout: What it is and 5 Actionable Tips to Avoid it
Fri, 08/11/2023
Even though your cyber heroes only work from 9-5, cyber threats are lurking 24/7.
Many dangers can materialize online, requiring constant monitoring and security operations professionals to keep up with and potentially mitigate the latest threats and vulnerabilities.
And with the rapid increase in global cyber attacks, the stress for cyber security professionals is through the roof.
Because of...
Blog
Cyber Security Threats in the Auto Industry and How to Prevent Them
Mon, 06/26/2023
Transportation plays a vital role in our daily lives, getting us to work, school, and social activities. In many regions, cars have become the primary mode of transportation, shaping the urban landscape and influencing how we interact with our environment.
For many people, owning a car is not only a convenience but a necessity in navigating the modern world.
Over the years, cars have...
Blog
What's the Difference Between Smishing and Vishing?
Fri, 06/23/2023
An urgent voicemail message from the tax department.
A text message from Microsoft tech support warning you about a problem with your computer.
A caller asking you to confirm your mailing address and credit card number so you can collect your free prize.
A text message requesting your confirmation of an Amazon shipment.
These are all examples of smishing and vishing cyber attacks. They have...
Case Study
Canadian University Reduces Data Breach Potential And Strengthens Security Culture Through An Effective Awareness Training Program
Learn how a recognized Canadian university obtained a training participation rate of over 42% with the help of engaging security awareness content.
Blog
Why Organizations Need Data-Centric Security Strategies
Mon, 05/22/2023
Many employees are celebrating the recent shift to remote and hybrid work. However, some security specialists and compliance experts are not as thrilled. Digitalization, cloud computing, and Software as a Service (SaaS) bring new freedom and flexibility to organizations and workers.
At the same time, they send data out into the wild beyond traditional security perimeters. There is a lot of...
Blog
10 Most Desired Traits of a Cyber Security Professional
Fri, 05/12/2023
Whether you’re just starting out in the workforce or making a career change, knowing what skills make up an excellent cyber security professional and how to work towards them is essential.
The good news is that the industry as a whole is in dire need of qualified professionals, with the cyber skills gap totaling 3.4 million workers as of this year, a 26.2% increase since 2021.
However, you still...
Blog
Becoming a Cybersecurity Pro: The 10 Qualities You Need to Succeed
Mon, 04/03/2023
Cyber security is one of the fastest-growing fields in technology, and with the number of cyber attacks increasing every year, it’s no wonder why it’s also one of the fields hiring the most.
Nowadays, almost every company needs a cyber security department to protect its data from hackers and scammers. Cybercrime magazine estimates there will be over 3.5 million cyber security job openings in the...
Blog
The Security Risks of Improper Employee Offboarding and How to Prevent It
Fri, 03/17/2023
Employees come and go for a variety of reasons. If you’re lucky, they’ll be very cooperative with the offboarding process, but this isn’t always the case. And even if they are, you still have to take it with a grain of salt. Some say that calm and cooperative offboarding is often the most dangerous because people aren’t as diligent when the situation seems lax.
If these moments have any...
Blog
How to Transition from Data Protection to Cyber Culture
Wed, 12/28/2022
The way we think about data protection is changing. Cyber culture is emerging as the new norm, and organizations must adapt their strategies to stay ahead of the curve.
Data protection has traditionally focused on preventing breaches and protecting sensitive information. However, cyber culture goes beyond this by encompassing all aspects of online life. It includes everything from how we interact...
Blog
Gift Card Scams: How to Easily Spot and Avoid These Cyber Threats
Fri, 11/25/2022
Did you know that gift card scams are among the most popular cyber threats?
The same things that make gift cards popular with consumers—convenience and ease of use—also make them attractive to scammers as a vehicle for fraud.
Gift cards, also known as gift certificates or vouchers, have topped the list of reported fraud payment methods every year since 2018, according to the Federal Trade...