Resources

Blog

What You Need to Know About the 2022 Australian Cyber Attacks

There is a sharp rise in cyber attacks targeting businesses and organizations across Australia. The nature of these attacks ranges from ransomware and phishing scams to distributed denial-of-service (DDoS) attacks, with some estimates suggesting that the number of cyber incidents could be as high as one million per year. The financial cost of these cyber attacks is immense,...
Blog

Gift Card Scams: How to Easily Spot and Avoid These Cyber Threats

Did you know that gift card scams are among the most popular cyber threats? The same things that make gift cards popular with consumers—convenience and ease of use—also make them attractive to scammers as a vehicle for fraud. Gift cards, also known as gift certificates or vouchers, have topped the list of reported fraud payment methods every year since 2018, according to the...
Blog

The Recent Dropbox Breach and What We Can Learn From It

On November 1st, 2022, Dropbox became the victim of a cyber attack where source code repositories, as well as names and emails of their employees, were unauthorizedly accessed. It is not yet clear how the unauthorized access took place, but Dropbox has said that they are investigating the matter. The company is urging all users to change their passwords as a precautionary...
Blog

13 Online Shopping Tips to Stay Safe During Black Friday and Cyber Monday

During the annual eCommerce bonanza known as Black Friday and Cyber Monday weekend, shopping websites will be swarming with people who are mostly unaware of cyber threats that can leave personal data vulnerable. In 2021, Europe, Canada, and the United States saw a 50% spike in transactions during the Black Friday and Cyber Monday window from the previous week. With the...
Blog

5 Ways Your Organization Should Take Advantage of Cyber Security Awareness Month

With an ever-increasing threat complexity across the cyber threat landscape, Cyber Security Awareness Month (CSAM) provides an opportunity to reflect on how enterprises can enhance their defenses and educate employees on cyber security best practices. Few areas are as important to focus on as security awareness. As part of the 2021 Gone Phishing Tournament, launched during...
Blog

Bell Canada Cyber Attack: What You Can Learn from This Data Breach

On September 15, the Hive ransomware group claimed to have launched an attack against Bell Technology Solutions on August 20, 2022. The compromised information contained approximately 1.9 million active email addresses, 1,700 names, and active phone numbers. Bell Technology Solutions is a subsidiary of Bell Canada, a leading communications company and communications provider...
Blog

How to Choose the Best Security Awareness Training Topics for Your Training Program

The secret of any good security awareness training program is teaching your employees how to mitigate the threats they’re most likely to encounter in the workplace. To do this, you need to choose your security awareness training topics carefully. No two organizations have the same infrastructure, vulnerabilities, or user access policies to sensitive data, so there’s no one...
Blog

What are Email Security Gateways and Why are They Important?

Whether deployed as a cloud service or on-premises, email security—and especially email security gateways—is of growing importance to organizations of all sizes, particularly given the upheavals to the working world over the last several years. It is estimated that in the post-pandemic world, one quarter of the workforce will choose to permanently work remote. In some sectors,...
Blog

What is a Zero Trust Access Network

None of the innovations seen in workplaces over the years posed challenges as significant as remote work. Even before hybrid workforces were the norm, many companies worldwide found themselves consolidated in large multinationals with employees all over the globe. The leading problem companies face, no matter the industry, is giving all their employees the same working...
Blog

5 Examples of Spear Phishing Attacks

When it comes to cyber crime, hackers like to locate the most high-value targets, whether it’s a piece of infrastructure or an individual with access to privileged information, all while expending the least effort possible. In most examples of spear phishing attacks, a criminal will send out targeted attacks via email to multiple users. In these emails, the attacker will use...
Blog

7 Types of Spoofing Attacks And How To Detect Them

Spoofing refers to an attack where hackers use various ways to disguise their identity so that their victims think they are talking to their coworker, boss, or business. The methods used to achieve this are the typical phishing tropes such as fake websites, links, and social engineering. When spoofing is involved, it’s often more helpful to focus on detecting the facade rather...
Press Release

HelpSystems Acquires Terranova Security to Aid Global Customers in Building Localized Employee Security Awareness Training

Terranova Security helps users spot email phishing attempts and other cyberattacks through education and simulation available in 40+ languages MINNEAPOLIS (April 8, 2022)—HelpSystems (now Fortra) announced today the acquisition of Terranova Security, a leader in global phishing simulation and security awareness training. Available in more than 40 languages, Terranova Security...
Blog

Top Examples of Malware Attacks

Malware is perhaps the most widely known out of all IT security threats. Since 1986, malware has become a significant concern for enterprise users, with recent examples including the Colonial Pipeline attack, Kaseya ransomware attack, and the SolarWinds Dark Halo breach. However, these attacks are just the tip of the iceberg, with many businesses falling victim to malware and...
Blog

How to Build a Successful Phishing Simulation Campaign

Phishing threats are everywhere, and if your employees don’t know how to spot them, you’re putting your information at risk. Knowing how to build a successful phishing simulation is vital for identifying how well employees can spot the latest threats and ensuring they know how to spot them independently. Unfortunately, many organizations fail to offer adequate security...
On-Demand Webinar

Terranova Security and Microsoft Present the Latest Global Phishing Benchmarks and Recommendations

Get the latest phishing benchmarking statistics from the 2021 Gone Phishing Tournament and learn how they can strengthen your security awareness initiatives in the coming year by attending the Phishing Benchmark Global Report Results webcast event. Terranova Security and Microsoft present highlights from the Tournament’s results and answer questions like: What geographic...
Blog

What You Need to Know About the Kaseya Ransomware Outbreak

In early July, IT solutions provider and remote management solution provider Kaseya announced that it had fallen victim to a supply chain ransomware attack. During the attack, hackers leveraged a vulnerability in Kaseya’s VSA platform to encrypt the data of hundreds of downstream MSPs and their clients. The Kaseya ransomware outbreak is one of the latest high-profile...
Blog

7 Important Takeaways from the 2021 Security Awareness Virtual Summit

On June 22nd, Terranova Security hosted the 2021 edition of the Security Awareness Virtual Summit. Sponsored by Microsoft, the virtual event boasted sessions featuring speakers from some of the cyber security industry’s most recognized entities, including the National Cyber Security Alliance (NCSA) and Gartner. The event’s lineup also featured a panel discussion featuring...
Blog

What You Need to Know About the Latest Facebook Data Leak

At the start of April, hackers leaked the data of 533 million Facebook users from 106 countries in an online hacking forum. The leaked data included the private information of Facebook users like full names, phone numbers, email addresses, locations, Facebook IDs, and biographical data. While hackers obtained the information in 2019, there are serious concerns over how cyber...