Resources

Blog

A Security Awareness State of Mind In 5 Steps

Security Awareness Professionals! This Is Day 3 of Gartner Security and Risk Management Summit 2018. Join Terranova at booth 119! We have been exchanging numerous ideas with participants about raising security awareness effectively and user training initiatives. Consequently, we are focusing our discussion on security awareness. We ask the following question: “How do you measure employees’...
Blog

Overcome the Security Awareness Blues Analyze Needs. Plan Early.

Without awareness, there is no security. Truly an inseparable pair! This is Day 4 of RSA Conference 2018 , and the Terranova team has been engaging in some interesting conversations. You have expressed views and concerns regarding Information Security Awareness (ISA). And we are taking notes! The article that follows discusses the first phases of implementation of a security awareness program...
Blog

A Comprehensive Guide on Learning Management Systems

The secret for continuous growth is to strive for success through effective learning opportunities and employee engagement. Organizing educational content for your business has its challenges, especially when priorities are not arranged efficiently. From compliance to learner validation and user experience, any number of factors can make or break your business’ learning efforts. When aiming for...
blog

Terranova is once again recognized as a leader in Gartner’s Magic Quadrant

Gartner has recognized Terranova WW Corporation among the leaders in its 2016 Magic Quadrant for Security Awareness Computer-Based Training. “We are proud to have been recognized by Gartner again this year,” said Terranova President Lise Lapointe. “We believe this position solidifies our status as a world leading provider in information security awareness solutions.” Widely regarded as THE global...
Blog

Recent phishing attacks demonstrate widespread dangers

By this point, the dangers presented by phishing attacks are becoming increasingly well known. Business leaders recognize that information security awareness is critical for organizations of all kinds, and these programs need to focus heavily on phishing if firms want to remain protected in the current cybersecurity landscape. Phishing attacks have become among the most dangerous forms of...
Blog

Employee error leads to Rogers Communications data breach

While certainly not the biggest data breach in recent memory, this Rogers Communications incident demonstrates how a seemingly small employee error can have significant consequences in the realm of cybersecurity. Data breaches have become major news topics and with good reason. These incidents have major implications not just for the businesses affected but also for their employees, their...
Blog

Risk of data breaches, cybercrime growing in Latin America

Latin American companies need to increase their investment in cybersecurity, including security awareness training for employees. Data breaches and cybercrime used to be seen as shocking, alarming and difficult to fathom. Today, they seem almost run of the mill. The world and many of its criminals have gone digital, and yet countless organizations have yet to embrace new strategies that can...
Blog

Cybersecurity for companies

In April 2013, the Canadian government announced its action plan for cybersecurity and highlighted the successes realized within the framework of its cybersecurity strategy to enhance cyberspace security for Canadians. One such measure involves the Canadian Cyber Incident Response Center (CCIRC), which supports Public Safety Canada, acting as the national coordinating center for cybersecurity...
Blog

Business Continuity Management (BCM)

The business continuity management program (BCM) covers the prevention, response and organization of actions required after an event which could significantly disrupt business operations. This ongoing program is more than an IT recovery plan. Here are the steps and components of a BCM, their relationships and the winning conditions necessary to implement such a program within a company. Governance...
Blog

Secure Behavior in the Office

Nowadays, information security is a very common term used in the business world. Previously, security was simply a matter of installing a firewall to protect a corporate network by adding barriers to prevent intruders from access it. In the last few years, information has become electronic, or should I say virtual, in its primary form. What used to be on hard copy or paper form is now stored...
Blog

Secure information destruction

What is the value of the information stored on your computer equipment or paper documents? What would the impacts be if your personal or confidential information fell into the wrong hands (e.g. financial loss, loss of image / reputation, regulatory or legal non-compliance)? Can you be certain that a proper destruction method was used on the information (whether in digital or paper form) to ensure...