Resources

Blog

Cyber Security Threats in the Auto Industry and How to Prevent Them

Transportation plays a vital role in our daily lives, getting us to work, school, and social activities. In many regions, cars have become the primary mode of transportation, shaping the urban landscape and influencing how we interact with our environment. For many people, owning a car is not only a convenience but a necessity in navigating the modern world. Over the years,...
Blog

Why Organizations Need Data-Centric Security Strategies

Many employees are celebrating the recent shift to remote and hybrid work. However, some security specialists and compliance experts are not as thrilled. Digitalization, cloud computing, and Software as a Service (SaaS) bring new freedom and flexibility to organizations and workers. At the same time, they send data out into the wild beyond traditional security perimeters....
Blog

10 Most Desired Traits of a Cyber Security Professional

Whether you’re just starting out in the workforce or making a career change, knowing what skills make up an excellent cyber security professional and how to work towards them is essential. The good news is that the industry as a whole is in dire need of qualified professionals, with the cyber skills gap totaling 3.4 million workers as of this year, a 26.2% increase since 2021....
Blog

What's the Damage? The Truth About the Cost of Data Breaches

In today's interconnected world, organizations are responsible for their cyber security practices as well as those of their third-party vendors. With increasingly complex risk management scenarios, the impact of a data breach can be catastrophic for an entire supply chain. According to a study by IBM, 83% of U.S. companies who participated have experienced a data breach more...
Blog

Becoming a Cybersecurity Pro: The 10 Qualities You Need to Succeed

Cyber security is one of the fastest-growing fields in technology, and with the number of cyber attacks increasing every year, it’s no wonder why it’s also one of the fields hiring the most. Nowadays, almost every company needs a cyber security department to protect its data from hackers and scammers. Cybercrime magazine estimates there will be over 3.5 million cyber security...
Blog

The California Privacy Rights Act (CPRA) and How it Affects Your Business

New regulations are already keeping IT professionals on their toes in 2023. One monumental change for California residents and businesses is the California Privacy Rights Act (CPRA). The legislation came into force on January 1, 2023. Legislators drafted the new rules to empower consumers and close gaps in the California Consumer Privacy Act (CCPA). The CPRA gives customers...
Blog

What You Need to Know About the Google Drive Scam

Hackers are targeting hundreds of thousands of Google users with fake Google Drive notifications and emails to try and trick them into visiting malicious websites.
Blog

6 Things to Learn from the Garmin Security Breach

As much as we can say that cyber security measures are advancing, we can say the same about cyber criminals and their strategies. In 2022, ransomware attacks occurred every 11 seconds on average, at a global annual cost to businesses and governments of $20 billion US. Costs are rising in part due to the growing ransoms demanded from victims. While estimates of the average...
Blog

Everything You Need to Know About Biometrics Hacking

Biometric authentication, such as face IDs, retina scans, and fingerprints, were introduced to our devices to increase security. At first, it felt like it was doing what it was meant to do. Plus, the convenience it brought with it was top-notch. I mean, accessing your smartphone with your thumb? Logging into your bank account using your face ID? Amazing. However, over the...
Blog

Is Your Personal Data Safe on Meta’s Social Media Platforms?

Not only are they burning through cash as they pivot toward the metaverse, but their struggles with data privacy are an ongoing issue. In many ways, Facebook/Meta’s data privacy troubles began in 2018, with revelations that a data-marketing firm had illegally collected the personal details of more than 80 million Facebook users. However, despite promises of improvements and...
Blog

Cyber Attacks Pose the Biggest Risk to UK Banks – Bank of England

This financial sector’s reliance on computer systems and network has made it an attractive target for cyber attacks, now the biggest risk to the UK financial system. In its latest Financial Stability Report, the Bank of England (BoE) agrees that cyber threats may be prevalent in 2023. The BoE said that it is working to strengthen defenses against cyber attacks. The report...
Blog

What You Need to Know About the 2022 Australian Cyber Attacks

There is a sharp rise in cyber attacks targeting businesses and organizations across Australia. The nature of these attacks ranges from ransomware and phishing scams to distributed denial-of-service (DDoS) attacks, with some estimates suggesting that the number of cyber incidents could be as high as one million per year. The financial cost of these cyber attacks is immense,...
Blog

Gift Card Scams: How to Easily Spot and Avoid These Cyber Threats

Did you know that gift card scams are among the most popular cyber threats? The same things that make gift cards popular with consumers—convenience and ease of use—also make them attractive to scammers as a vehicle for fraud. Gift cards, also known as gift certificates or vouchers, have topped the list of reported fraud payment methods every year since 2018, according to the...
Blog

The Recent Dropbox Breach and What We Can Learn From It

On November 1st, 2022, Dropbox became the victim of a cyber attack where source code repositories, as well as names and emails of their employees, were unauthorizedly accessed. It is not yet clear how the unauthorized access took place, but Dropbox has said that they are investigating the matter. The company is urging all users to change their passwords as a precautionary...
Guide

From Data Protection to Cyber Culture

Using security awareness training to build strong cyber security into your organizational culture is crucial to keep sensitive information safe. But is your awareness training program resonating with employees? Terranova Security, in collaboration with recognized research firm IPSOS, answer this question and many more in this new report that truly reflects employee attitudes...
Blog

Bell Canada Cyber Attack: What You Can Learn from This Data Breach

On September 15, the Hive ransomware group claimed to have launched an attack against Bell Technology Solutions on August 20, 2022. The compromised information contained approximately 1.9 million active email addresses, 1,700 names, and active phone numbers. Bell Technology Solutions is a subsidiary of Bell Canada, a leading communications company and communications provider...
Blog

What are Email Security Gateways and Why are They Important?

Whether deployed as a cloud service or on-premises, email security—and especially email security gateways—is of growing importance to organizations of all sizes, particularly given the upheavals to the working world over the last several years. It is estimated that in the post-pandemic world, one quarter of the workforce will choose to permanently work remote. In some sectors,...

5 Ways to Be Prepared for QR Code Scams

Restaurant menus worldwide have been replaced by QR codes stuck to the table during the COVID-19 pandemic. Physical menus were judged too difficult to clean and could act as infection vectors. Since everyone has a smartphone nowadays, QR codes were attractive alternatives instead of asking clients to type in the restaurant’s URL on their phones. Before, QR codes were mainly...
Blog

What You Need to Know About the Latest Facebook Data Leak

At the start of April, hackers leaked the data of 533 million Facebook users from 106 countries in an online hacking forum. The leaked data included the private information of Facebook users like full names, phone numbers, email addresses, locations, Facebook IDs, and biographical data. While hackers obtained the information in 2019, there are serious concerns over how cyber...
Blog

Data Breaches in 2020: The Year in Review

The disruption caused by the Covid-19 pandemic saw enterprises across the globe rapidly adopt remote working to support social distancing and comply with quarantine restrictions implemented by national governments. Amid this chaos, many cyber criminals created new phishing scams and other online threats, leading to many high profile data breaches. One of the most alarming...