Resources

Blog

3 Ways Communication Tools Can Improve Security Awareness Training

To create a truly effective security awareness training program, your organization must also build a clear, engaging internal communication structure to match. This process involves more than just sending out one or two mass emails to let employees know such a program exists. It’s about establishing a consistent drumbeat of content distribution that grows participation numbers, boosts subject...
Blog

The CRA Cyber Attack: Here’s What You Need to Know

In mid-August, cybercriminals targeted the Canada Revenue Agency with two credential stuffing attacks, obtaining the usernames and passwords of 9,041 GCKey accounts, and 5,500 CRA accounts. The fraudsters then used the stolen login credentials to apply for the Canadian Emergency Response Benefit (CERB). In response to the attack, a statement released by the Office of the Chief Information Officer...
Guide

Phishing Awareness Training Kit

Use these free phishing awareness resources to promote a security-aware workforce. The kit includes phishing infographics, end-user training videos and tips on how to recognize phishing emails.
Blog

How to Protect Your Data from the Microsoft Office 365 Phishing Scam

Since December 2019, there has been a coordinated campaign of phishing attempts targeting Office 365 users. Cyber criminals have sent spoofed email, gathering the login credentials and payment details of Microsoft accounts in over 62 countries. According to one report, despite a 42% reduction in phishing attempts in 2019, scams like this Microsoft Office 365 campaign remain a significant threat...
Blog

What the Twitter Hack Revealed About Social Engineering

Less than a week ago, Twitter fell victim to a monumental security breach that saw hackers successfully orchestrate a social engineering attack and take over high-profile Twitter user accounts, including world-renowned companies like Apple and business magnates like Bill Gates and Elon Musk. The cybercriminals used that access to launch a bitcoin scam that generated over $120,000. The attack is...
Blog

This is Why You Need Mobile Responsive Security Awareness Training

(7 min read) Hint: It has everything to do with effective mobile learning. The past decade’s explosion of smartphone and tablet usage has magnified the importance of well-designed mobile responsive content as a vital part of any training program. Recent studies echo clear mobile learning preference statistics, including how: 70% of learners feel more motivated when training on a mobile device...
Blog

2020 Security Awareness Virtual Summit Preview

Security awareness training is indispensable to ensure that your users have the knowledge they need to protect your organization’s sensitive data from cyber threats. These training initiatives also help create a strong cyber-secure organizational culture that emphasizes engaged, aware employees. On July 7th, Terranova Security will host the 2020 edition of the Security Awareness Virtual Summit,...
Blog

Don’t Be Fooled By A Spoofing Attack

Know how to identify and prevent a spoofing attack Spoofing attacks are the ultimate form of cybercriminal trickery and deception. Cybercriminals disguise themselves and rely on trust to steal confidential information, install ransomware, and commit other cybercrimes. Spoofing comes down to trust. Cybercriminals hide behind trusted people, domains, URLs, and the technical elements that make up a...
On-Demand Webinar

Protecting Your Healthcare Organization From Cyber Threats

DURATION: 30 MINUTES With the current COVID-19 pandemic breeding uncertainty and unique challenges, the healthcare industry has become a prime target and is facing cyber threats at an alarming rate. Watch this on-demand webcast and Q&A with CISO Theo Zafirakos of Terranova Security on “Protecting Your Healthcare Organization from Cyber Threats” to learn strategies and best practices for security...
Blog

Cyber Security Tips and Advice for Remote Workers

COVID-19 is rapidly changing how we work, communicate, and interact with one another. Some private companies, public institutions, and government departments are mandating that all employees who can, must work from home. For many users this is the first time they have worked from home. Not only is there the stress of the uncertainties around COVID-19 but also an adjustment period for people...
Blog

How Role Based Security Awareness Training Bridges Security Awareness and Knowledge Gaps

Adult Learners Need Relevant and Relatable Training Using intelligent social engineering techniques, cybercriminals know how to tailor their cyber attacks to their recipients. An employee in HR receives a very different phishing email than the customer service representative in a call center or the salesperson who is traveling and accessing the network remotely. And this is exactly why...
On-Demand Webinar

The $25M Supply Chain Hack: Security Breach Podcast

Supply chain attacks are on the rise, with nearly 20% of organizations reporting breaches linked to vulnerabilities within their supply chains, according to IBM’s Cost of a Data Breach Report. These attacks come with a hefty price tag, averaging nearly $4.5 million per incident, and they often take longer to detect and resolve than other types of breaches.Join us in an insightful discussion with...