Datasheet
Phishing Training for Microsoft 365 E5 Customers
Terranova Security’s phishing training content topics include (but are not limited to):
Information Security Awareness Topics
Business email compromise
Email
Identity Theft
Introduction to information Security
Malware
Phishing
Ransomware
Social Engineering
Microlearning Library
Business email compromised (BEC)
C-Level Email Impersonation
Handling Unidentified Individuals
Mass...
Datasheet
Upgrade Security Awareness with Microsoft 365 and Terranova Security
Diverse Training for Global Teams
Offering courses in major languages, extending a total of 40+, to meet the diverse needs of global workforces, ensuring consistent security practices across all regions.
Metrics That Matter
Use the Security Awareness Index to pinpoint your high-risk users and clearly define your cybersecurity training outcomes with measurable, data-driven results.
...
Blog
How to Develop Security Awareness Training
Mon, 10/09/2023
According to Valimail’s Spring 2019 Email Fraud Landscape, about 3.4 billion phishing emails are sent each day, making it one of the most common types of cyber attacks.
This number shows how crucial it is to train your employees so they can recognize and report malicious emails.
That’s where cyber security awareness training comes in. With the right training program, you can provide your...
Blog
Risky Business: When Third-Party Troubles Become Your Own
Tue, 09/05/2023
Businesses don’t stand and operate alone. Organizations partner with an average of 10 third-party vendors to manage their operations.
Especially when talking about large corporations—they collaborate with various other organizations or firms helping them manage and advance their operations.
These firms include suppliers, manufacturers, service providers, software vendors, distributors, resellers...
Blog
How to Enhance Third Party Risk Management with Cyber Security Training
Mon, 06/12/2023
Did you know that on average, every company is connected to ten third-party businesses?
There’s the payroll services company that remotely manages employee wages. The Software-as-a-Service (SaaS) cloud storage provider that backs up customer account data. The security company that provides access control to company buildings and systems.
To achieve an efficient supply chain, organizations rely...
Blog
Why Your Third-Party Vendors Have Almost Definitely Been Breached and What to Do About It
Mon, 04/17/2023
The news from Human Resources is that employees are happier than ever. Working from home using third-party vendor services makes work easier and more flexible.
The news from IT is less enthusiastic. A recent report showed that a whopping 98% of organizations have at least one third-party provider that has suffered a data breach in the last two years.
Third-party vendor relationships are nothing...
Blog
How to Protect Your Sensitive Information from Word Document Malware
Tue, 12/27/2022
If you’re a company that uses email scanning technology as the first line of cyber defense, you should know about a recent slate of malicious Word document-based attacks.
These attacks are designed to deliver malware and ransomware to targeted systems.
Security researchers at Cisco Talos recently identified an attack where Word document files attached to emails were used to deliver Cobalt Strike...
Blog
What You Need to Know About The Office-365 Phishing Campaign Targeting C-Suite Executives
Fri, 02/12/2021
During the last week of January 2021, cyber security provider TrendMicro shared a blog post highlighting an Office-365 phishing campaign that criminals have targeted executives within manufacturing, tech, real estate, government, and finance since May 2020. As part of the scam, fraudsters sent the victims fake emails with links to a phishing site, where they harvested their credentials to sell...
Blog
The 2020 Security Awareness Virtual Summit for Partners: Here’s What You Need to Know
Mon, 10/26/2020
Robust, engaging security awareness training is an essential part of strong cyber security practices, especially given the accelerated digital transformation and shift by many organizations to remote workforces.
It can also be a crucial value-added product for resellers, distributors, MSSPs, OEMs partners and technology partners, who are looking to expand their portfolio, drive business growth...
Blog
How to Protect Your Data from the Microsoft Office 365 Phishing Scam
Fri, 07/31/2020
Since December 2019, there has been a coordinated campaign of phishing attempts targeting Office 365 users. Cyber criminals have sent spoofed email, gathering the login credentials and payment details of Microsoft accounts in over 62 countries.
According to one report, despite a 42% reduction in phishing attempts in 2019, scams like this Microsoft Office 365 campaign remain a significant threat...