Resources

Blog

2020 Security Awareness Virtual Summit Preview

Security awareness training is indispensable to ensure that your users have the knowledge they need to protect your organization’s sensitive data from cyber threats. These training initiatives also help create a strong cyber-secure organizational culture that emphasizes engaged, aware employees. On July 7th, Terranova Security will host the 2020 edition of the Security...
Blog

How to Successfully Manage Repeat Clickers

(7 min read) Using online security awareness training to lower your click rate Recognizing a potential phishing email is the first step in avoiding falling victim to a cyber attack. The next and most important step is knowing what to do with this email. Ideally, you want your employees to report the phishing email to you and then delete the message. However, curiosity is...
Blog

Don’t Be Fooled By A Spoofing Attack

Know how to identify and prevent a spoofing attack Spoofing attacks are the ultimate form of cybercriminal trickery and deception. Cybercriminals disguise themselves and rely on trust to steal confidential information, install ransomware, and commit other cybercrimes. Spoofing comes down to trust. Cybercriminals hide behind trusted people, domains, URLs, and the technical...
On-Demand Webinar

Protecting Your Healthcare Organization From Cyber Threats

DURATION: 30 MINUTES With the current COVID-19 pandemic breeding uncertainty and unique challenges, the healthcare industry has become a prime target and is facing cyber threats at an alarming rate. Watch this on-demand webcast and Q&A with CISO Theo Zafirakos of Terranova Security on “Protecting Your Healthcare Organization from Cyber Threats” to learn strategies and best...
Blog

Cyber Security Tips and Advice for Remote Workers

COVID-19 is rapidly changing how we work, communicate, and interact with one another. Some private companies, public institutions, and government departments are mandating that all employees who can, must work from home. For many users this is the first time they have worked from home. Not only is there the stress of the uncertainties around COVID-19 but also an adjustment...
Blog

How Role Based Security Awareness Training Bridges Security Awareness and Knowledge Gaps

Adult Learners Need Relevant and Relatable Training Using intelligent social engineering techniques, cybercriminals know how to tailor their cyber attacks to their recipients. An employee in HR receives a very different phishing email than the customer service representative in a call center or the salesperson who is traveling and accessing the network remotely. And this is...
On-Demand Webinar

How Does Your Click Rate Stack Up?

Benchmarking statistics related to phishing simulations are critical for driving behavioral change. Based on the recent results of the 2019 Gone Phishing Tournament, learn how the click rate data gathered reinforces the importance of implementing a program that combines rich and engaging content for security awareness training and phishing simulations based on real-life...
Blog

Keep Your Employees Safe Online on Cyber Monday

Cyber Monday is right around the corner and this means employees will be shopping online at work. To prepare for the busiest online shopping day of the year, companies need to remind employees of how to be safe online. It’s very easy for even the most cyber-aware employees to get caught up in the rush of online holiday sales and promotions. Retailers know that shoppers want...
On-Demand Webinar

On-Demand Webcast: The Five Stages of Being Phished

When falling for a phishing scam, users usually go through one or more emotional stages including; denial, anger, bargaining, depression and acceptance. Watch now to learn more about: The 5 stages and how they affect the impact of a data breach Using a security awareness program to help users become cyber aware The role of just-in-time training and phishing simulations in...
Blog

Tips to help employees be cyber safe at home and at the office

The lessons learned from cyber security training for employees must extend beyond the office doors. It’s important that employees understand that cyber security awareness matters at the office and at home. We know that many people relax their cyber security practices when they’re using their home computers, laptops, and personal mobile devices. You want to give your staff,...
On-Demand Webinar

How To Set Security Awareness Strategic Goals, KPIs And Metrics

This session will focus on the value and importance of metrics, what metrics to consider and how to demonstrate security awareness program effectiveness. Metrics matter! Attend the session to learn to: Understand the difference between goals, KPIs and metrics in security awareness Set strategic goals, objectives, KPIs & metrics based on your organizations needs and...
On-Demand Webinar

Five Steps To Set Up A Cyber Security Ambassador Program

DURATION: 1 HOUR The responsibilities of today’s security awareness leaders are expanding and growing in complexity. They are expected to safeguard their organizations and reduce human risk with limited resources. Good news – They don’t have to do it alone! During this session you will learn: How to leverage a cyber security ambassador program to instill a security...
Blog

Why Gamify Security Awareness Training?

Leveraging a spirit of competition to drive engagement and create a security culture Gamification is a popular concept these days, and for good reason. With gamification, you can develop a game for learning more about a serious topic while also getting the learner to approach winning that game with the same fervor they would when playing for entertainment. So what happens when...
Blog

The Nine Elements Impacting Cybersecurity Awareness

The MINDSPACE framework: What factors influence human behavior? Even when your company has the best technology and the most efficient security controls, it still has to invest in the human factor. Regardless of the methods a company adopts, nothing can be accomplished unless users of the technology are motivated and able to apply the methods effectively. According to a recent...
Blog

5 Ways to Reduce the Risk of a Social Network Breach

Social networking overlaps corporate and personal lives, and so should the mission to create a culture of security awareness. It’s true. There was little – if nothing – any Facebook user could have done to prevent their passwords from getting exposed earlier this spring. Just look at the facts of the case, said Theo Zafirakos, Chief Information Security Officer and Security...
On-Demand Webinar

How to Succeed In Cyber Security Awareness

During this webcast, you will learn how to effectively implement a cyber security awareness program that will generate measurable results. Watch the webcast and start optimizing your cyber security awareness program now! During the webcast, learn more about: Tips and guidelines on how to implement a successful and measurable cyber security awareness program. A proven...
On-Demand Webinar

Everything You Ever Wanted to Know About the GDPR

DURATION: 45 MINUTES During this webcast, you will learn more about the GDPR's key concepts and principles, as well as the personal data rights protected under this regulation.   Watch the GDPR webcast and reduce the risk of facing penalties for non-compliance!   Image During this free webcast, learn more about: What is the GDPR...
Video

Ransomware: Move from Beware to Be Aware!

DURATION: 40 MINUTES Do you fear that your organization’s data will be kidnapped and held for ransom? It is critical for CISOs and security teams to have the right methods, tools and techniques to stop ransomware from infecting their environment. An effective approach goes beyond technology and processes—it needs to include the human factors that contribute to ransomware...
On-Demand Webinar

The Human Fix to Human Risk

DURATION: 30 MINUTES During this webcast, learn how the proven Security Awareness 5-Step Framework is leveraged by organizations globally for raising security awareness effectively. We will walk you through every detail you need to consider in order to plan and deliver a successful awareness program. Image The framework...
Blog

Cyber Security Breaches – Reduce The Human Risk Factor

You can have the most powerful, cutting-edge security technology in the world, but if a user clicks on the link in a malicious email, lets a stranger tailgate into your building or uses 1234 as their login password, they unwittingly open your organization up to a cyber security breach. The fact is that the human risk factor remains your greatest point of vulnerability when it...