Resources

Blog

7 Examples of Social Media Scams You Should Avoid at All Costs

Image Social media platforms have become non-negotiables in our daily lives. We always find ourselves online at our favorite social media sites to connect with loved ones, share our thoughts, and discover interesting content. While social media has become central to our routines, its vast reach and anonymity provide certain risks...
On-Demand Webinar

2023 Gone Phishing Tournament Results Webinar

Watch the panel discussion break down the latest phishing statistics from the 2023 Gone Phishing Tournament and learn how to leverage them to help your organization strengthen security awareness initiatives.
Blog

Pig Butchering Scam – What It Is and How to Protect Yourself

Image Cyber threats are constantly evolving, and the most recent evolution of phishing scams is proving particularly effective. Boasting a gruesome name, pig butchering is a cyber threat that reels in victims and steals thousands, sometimes millions of dollars.  Pig butchering has quickly become one of the most lucrative scams thanks...
Blog

What is Baiting in Cyber Security?

Image Cyber criminals are constantly evolving their methods, but their biggest leverage for growth will always be exploiting the human factor. Software and physical measures against cyber attacks have become so advanced that tricking workers is the only remaining attack vector criminals can reliably use. According to Verizon’s 2023...
Blog

7 Smishing Examples and How to Protect Yourself

Image With roughly 5 billion people—a whopping 65% of the global population—sending and receiving SMS messages, it’s no wonder that hackers have taken to SMS as a new way to lead cyber attacks. In 2022, 68.4 million Americans fell victim to a phone scam. And only 65% of Americans say they would delete a text if it came from an...
Blog

Protect your loved ones from phishing, social engineering and other cyber attacks

Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing, vishing, smishing, and social engineering. Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of...
Blog

What is Quishing?

QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives. The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes,...
Trial

Phishing Simulation Free Trial

95% of data breaches are due to human error. Are you keeping your data safe?  Image Don’t let high-risk end user behaviors leave your sensitive information, networks, and systems at risk of a data breach. Give your employees and third-party vendors the knowledge they need to spot common phishing warning signs and keep critical data...
Blog

Data Privacy on Social Media: How to Protect Your Information

More than half of the world population (54%) spends an average of 2 hours and 21 minutes on social media daily. Users’ likes, opinions, geotags, photo uploads, and friend connections are considered personal data. What social media companies do with that information is vitally important. However, users often give those platforms enormous control over their data when they sign...
Blog

How to Avoid Phishing Simulations False Positives?

This year is seeing more phishing attacks in more places, having more detrimental impacts. One security messaging provider noted a 61% increase in phishing attacks between April and October 2022 compared to the same period the previous year. Another report observed that when phishing attacks were successful in 2022, financial losses from those incidents increased by 76%. In...
Blog

Your Real-World Footprint Has a Digital Counterpart: Here’s What You Need to Know About Digital Footprints

Detectives look for footprints and fingerprints because they’re instant proof of where someone’s been, what they touched, and where they’re headed. The concept holds online, too. Your digital footprint is a map of where you (and your devices) have been, what you do online, how you behave, and where you’re probably headed next in the cyber sphere. In this article, we explain...
Blog

Android vs iOS: Which Operating System is Safer?

Cellphones have seen one of the most dramatic technological growths of any hardware in recent history. From simple portable phones a few decades ago, they’ve become fully-fledged computers with their own OS and applications used daily by most people worldwide. Smartphones have become such a fixture of life, and hackers and scammers have been working to exploit these devices...
Blog

What's the Difference Between Smishing and Vishing?

An urgent voicemail message from the tax department. A text message from Microsoft tech support warning you about a problem with your computer. A caller asking you to confirm your mailing address and credit card number so you can collect your free prize. A text message requesting your confirmation of an Amazon shipment. These are all examples of smishing and vishing cyber...
Blog

Do You Know What You're Getting Into? The Risks of Social Media for Your Business

Social media has completely redefined our lives. From how we communicate to the type of information we broadcast, people worldwide have used these platforms to make new friends, share information, start and promote businesses, and so much more. These platforms have become amazingly convenient and powerful to the point where they have become a centerpiece of most people’s lives...
Blog

Countering The 5 Most Common Social Media Phishing Scams

It’s upsetting when bad actors turn the good things in life against us. We use social media daily to celebrate, learn, keep in touch, fall in love, and buy things that satisfy our needs and wants. Unfortunately, hackers exploit that information to execute phishing attacks. Social media platforms did not only experience more attacks in 2022, but it’s also become the fastest...
Blog

How to Build a Successful Phishing Simulation Campaign

Phishing threats are everywhere, and if your employees don’t know how to spot them, you’re putting your information at risk. Knowing how to build a successful phishing simulation is vital for identifying how well employees can spot the latest threats and ensuring they know how to spot them independently. Unfortunately, many organizations fail to offer adequate security...
Video

How Security Awareness Training Targets and Changes User Phishing Behaviors

Learn the secrets behind effectively managing the human element of cyber security -- watching the Terranova Security presentation from the 2020 Forrester Security and Risk Virtual Forum on-demand! This presentation, from author and Terranova Security's Lise Lapointe, includes expert insight into: Why high-quality content that’s available in multiple formats, accessible to...
Guide

Phishing Kit