On-Demand Webinar
Understanding Real-World Social Engineering Threats
Social engineering is a major cybersecurity threat, targeting the most unpredictable element of any security system: people.Unlike attacks that exploit technical vulnerabilities, social engineering preys on human psychology, tricking individuals into compromising their organization's defenses.In this webinar, Sean Bell, Sr. Solutions Engineer at Fortra, covers:How attackers craft convincing and...
On-Demand Webinar
Navigating the Cyber Threat Landscape with a Human-Centric Approach
Enhance your email security strategy with expert insights from Ravisha Chugh, a former Gartner analyst and current Product Marketing Lead at Fortra. In this webinar recording, you'll learn:What It Means to Have a Human-Centric Approach in Email Security: Understand the importance of focusing on the human element.Top Email Security Threats: Identify and counter Business Email Compromise (BEC),...
Blog
7 Examples of Social Media Scams You Should Avoid at All Costs
Fri, 04/05/2024
Social media platforms have become non-negotiables in our daily lives. We always find ourselves online at our favorite social media sites to connect with loved ones, share our thoughts, and discover interesting content.
While social media has become central to our routines, its vast reach and anonymity provide certain risks—they’ve become a...
Blog
What is Quishing?
Fri, 02/09/2024
QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives.
The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes, easily generated and cost...
Blog
Data Privacy on Social Media: How to Protect Your Information
Fri, 12/01/2023
More than half of the world population (54%) spends an average of 2 hours and 21 minutes on social media daily. Users’ likes, opinions, geotags, photo uploads, and friend connections are considered personal data.What social media companies do with that information is vitally important. However, users often give those platforms enormous control over their data when they sign user agreements.While...
Blog
Your Real-World Footprint Has a Digital Counterpart: Here’s What You Need to Know About Digital Footprints
Mon, 09/11/2023
Detectives look for footprints and fingerprints because they’re instant proof of where someone’s been, what they touched, and where they’re headed. The concept holds online, too.
Your digital footprint is a map of where you (and your devices) have been, what you do online, how you behave, and where you’re probably headed next in the cyber sphere.
In this article, we explain what digital...
Blog
Android vs iOS: Which Operating System is Safer?
Mon, 07/10/2023
Cellphones have seen one of the most dramatic technological growths of any hardware in recent history. From simple portable phones a few decades ago, they’ve become fully-fledged computers with their own OS and applications used daily by most people worldwide.
Smartphones have become such a fixture of life, and hackers and scammers have been working to exploit these devices for personal gain....
Case Study
Canadian University Reduces Data Breach Potential And Strengthens Security Culture Through An Effective Awareness Training Program
Learn how a recognized Canadian university obtained a training participation rate of over 42% with the help of engaging security awareness content.
Blog
Do You Know What You're Getting Into? The Risks of Social Media for Your Business
Wed, 05/03/2023
Social media has completely redefined our lives. From how we communicate to the type of information we broadcast, people worldwide have used these platforms to make new friends, share information, start and promote businesses, and so much more.
These platforms have become amazingly convenient and powerful to the point where they have become a centerpiece of most people’s lives. The ubiquity of...
Blog
The Security Risks of Improper Employee Offboarding and How to Prevent It
Fri, 03/17/2023
Employees come and go for a variety of reasons. If you’re lucky, they’ll be very cooperative with the offboarding process, but this isn’t always the case. And even if they are, you still have to take it with a grain of salt. Some say that calm and cooperative offboarding is often the most dangerous because people aren’t as diligent when the situation seems lax.
If these moments have any...
Blog
Countering The 5 Most Common Social Media Phishing Scams
Thu, 03/16/2023
It’s upsetting when bad actors turn the good things in life against us. We use social media daily to celebrate, learn, keep in touch, fall in love, and buy things that satisfy our needs and wants. Unfortunately, hackers exploit that information to execute phishing attacks.
Social media platforms did not only experience more attacks in 2022, but it’s also become the fastest-growing attack surface....
Blog
How to Transition from Data Protection to Cyber Culture
Wed, 12/28/2022
The way we think about data protection is changing. Cyber culture is emerging as the new norm, and organizations must adapt their strategies to stay ahead of the curve.
Data protection has traditionally focused on preventing breaches and protecting sensitive information. However, cyber culture goes beyond this by encompassing all aspects of online life. It includes everything from how we interact...
Blog
Learn How Security Awareness Can Help Prevent Insider Threats in Your Organization
Tue, 12/08/2020
Actionable security awareness tips on how employees can prevent insider threats
A misplaced USB drive with confidential data. An opportunistic employee sharing confidential information with a competitor. An employee who accidentally clicks a phishing email. These are all examples of insider threats to your organization.
Insider threats unfortunately are not simply the stuff of movies and crime...
Blog
This is Why You Need Mobile Responsive Security Awareness Training
Tue, 06/30/2020
(7 min read)
Hint: It has everything to do with effective mobile learning.
The past decade’s explosion of smartphone and tablet usage has magnified the importance of well-designed mobile responsive content as a vital part of any training program. Recent studies echo clear mobile learning preference statistics, including how:
70% of learners feel more motivated when training on a mobile device...
Blog
5 Ways to Reduce the Risk of a Social Network Breach
Wed, 05/29/2019
Social networking overlaps corporate and personal lives, and so should the mission to create a culture of security awareness.
It’s true.
There was little – if nothing – any Facebook user could have done to prevent their passwords from getting exposed earlier this spring.
Just look at the facts of the case, said Theo Zafirakos, Chief Information Security Officer and Security Awareness Coach at...
Blog
Cyber Security Breaches – Reduce The Human Risk Factor
Wed, 10/24/2018
You can have the most powerful, cutting-edge security technology in the world, but if a user clicks on the link in a malicious email, lets a stranger tailgate into your building or uses 1234 as their login password, they unwittingly open your organization up to a cyber security breach. The fact is that the human risk factor remains your greatest point of vulnerability when it comes to cyber...
Guide
The Human Fix To Human Risk
Discover the secret to making your employees your most robust defense against cyber attacks. Flip the narrative with The Human Fix to Human Risk.