Resources

Blog

What to Expect From Gone Phishing Tournament 2023

Every year, phishing statistics seem to get worse. The year 2022 witnessed over 4.7 million attacks, with a significant surge occurring in Q4, accounting for 1.35 million of those incidents. This trend indicates a steady annual growth rate of 150% since 2019. There is no doubt that phishing is the leading and most dangerous modern cyber attack. Recognizing these challenges, Fortra’s Terranova...
Blog

Why Cyber Security Awareness is Important in K-12 and Higher Education

K-12 and higher ed institutions were caught off-guard by the sudden shift to online classes—most found themselves vulnerable and unprepared for cyber threats. A recent slew of cyber attacks directed at school districts has led the US government to pass a new law called the K-12 Cybersecurity Act . This new legislation mandates the Department of Homeland Security’s Cybersecurity and Infrastructure...
Blog

The Chain Reaction: Why Cyber Security in Supply Chain Networks is Critical

Imagine countless organizations working together like a well-oiled machine to create and deliver the products and services we rely on. That’s what supply chain networks are. Like a machine, each connection is vital to make the whole thing work. It’s a delicate dance of supply and demand, where each organization plays its part in keeping the network alive and thriving. And with technology...
Blog

Your Real-World Footprint Has a Digital Counterpart: Here’s What You Need to Know About Digital Footprints

Detectives look for footprints and fingerprints because they’re instant proof of where someone’s been, what they touched, and where they’re headed. The concept holds online, too. Your digital footprint is a map of where you (and your devices) have been, what you do online, how you behave, and where you’re probably headed next in the cyber sphere. In this article, we explain what digital footprints...
Blog

5 Reasons to Integrate Microlearning Into Your Security Awareness Training Program

Ten words: knowledge retention, behavior change, real-time, attention spans, rich media. As a security leader in your company, chances are you see how rapidly the cyber landscape is changing and how quickly cyber threats are evolving. Phishing, data breaches, malware , ransomware , and more threats are getting more sophisticated with every new technology. These risks are expected to double by 2025...
Blog

Risky Business: When Third-Party Troubles Become Your Own

Businesses don’t stand and operate alone. Organizations partner with an average of 10 third-party vendors to manage their operations. Especially when talking about large corporations—they collaborate with various other organizations or firms helping them manage and advance their operations. These firms include suppliers, manufacturers, service providers, software vendors, distributors, resellers...
Blog

ChatGPT and Its Recent Cyber Security Scares

Conversational AI has lately been the talk of the town for most knowledge workers worldwide. While this technology has existed for a few years, OpenAI’s ChatGPT released this year is leaps and bounds ahead of anything seen before. This trailblazing web app has been used for anything from writing wedding speeches to helping people do their jobs more efficiently. One thing is certain—a shocking...
Guide

Cyber Security Awareness: An Essential for Education

This eBook helps education leaders recognize cyber security risks and demonstrates how cyber security training programs can help mitigate the potential of a cyber attack. It encourages educational institutions to protect their employees, students, and institutional data based on proven cyber security best practices. Download the eBook to learn: How education's digital shift makes it a prime target...
Blog

Here's How Abandoned Domain Name Can Become a Cyber Threat

Do you have old pages on your website that you’ve forgotten about? Obsolete projects with old domain names? Old pages that are no longer active? If so, beware. Those subdomains you’ve forgotten about can be highly valuable to cyber attackers. Keeping your organization’s website up-to-date typically means updating content. But while you focus on the new, don’t neglect any old domains or unused...
Blog

Updated FCC Legislation Could Mean New Data Privacy Requirements for Telecoms

Telecommunications companies (telecoms) have been prime targets for cyber attackers. They operate critical infrastructure passage, and vast amounts of customer data pass through their networks. The United States Federal Communications Commission (FCC) is aiming to strengthen data security with new regulations around data breach reporting by communications carriers. The agency has long required...
Blog

Cyber Security Burnout: What it is and 5 Actionable Tips to Avoid it

Even though your cyber heroes only work from 9-5, cyber threats are lurking 24/7. Many dangers can materialize online, requiring constant monitoring and security operations professionals to keep up with and potentially mitigate the latest threats and vulnerabilities. And with the rapid increase in global cyber attacks, the stress for cyber security professionals is through the roof. Because of the...
Blog

Why Transparency After a Data Breach is Important

It’s one of the scariest outcomes of a cyber attack. A data breach’s effect can easily bankrupt a company, and even if appropriately handled, its consequences are often felt for months or years to come. One of the biggest issues with data breaches, and what is often the most damaging outcome , is the loss of trust from customers. After all, if a breach happened once, how do you know it won’t...
Blog

5 Reasons Why You Need Gamification In Your Cyber Security Awareness Program

There's a reason why video games are such a popular pastime for adults and children alike. They keep the users engaged by dividing the steps required to accomplish a task and rewarding them at every step of the way through points or in-game items. This strength leads to more immersion for the player and creates a sense of involvement with the content and story. The concept that makes this a...
Blog

Cyber Security Preparedness in a Hybrid World

Offices around the world have undergone a massive transformation in recent years. While a fully remote workforce remains offered by a minority of employers, the hybrid nature of workplaces is rapidly becoming the norm. A recent study by Cisco studied the cyber security challenges tied to a distributed workforce, and their cyber security readiness model created some troubling statistics. According...
Blog

Why Is Phishing Awareness Training Important?

The reality is simple. Phishing attacks are more prevalent than ever before. An estimated 3.4 billion fraudulent emails are sent out daily as part of phishing schemes, resulting in the FBI's Internet Crime Complaint Center (IC3) receiving over 651,800 phishing-related complaints annually. Adjusted losses for affected organizations topped $2.4 billion, costing them losses of up to $17,700 per...
Blog

How to Report a Phishing Email Scam: What You Need to Know

Over 3.4 billion phishing emails are sent out to unsuspecting recipients daily. At this rate, over 1 trillion email scams are deployed in one calendar year. The sheer enormity of these numbers makes it easier to understand how and why employees become victims of phishing email scams. Their typical email inbox is overflowing with emails from colleagues, partners, friends, family, third-party...
Blog

7 Signs of a Phishing Email

One of the most frequent attack vectors for cyber attackers is also one of the most used workplace applications. And you guessed it... that application is email. Thankfully, a lot of sophisticated technology these days can help protect organizations from cyber threats. Even so, this attack vector still puts your end users on the front lines of the cyber security threats. This means that to secure...
Blog

What is a Tailgating Attack?

While high-profile ransomware and malware attacks get lots of media attention, threats like tailgating attacks and piggybacking attempts often get overlooked. Yet these social attacks present a substantial risk to modern enterprises. During these attacks, a cyber criminal will attempt to enter a restricted area without going through an authentication process, such as a passcode-protected door or a...
Blog

Android vs iOS: Which Operating System is Safer?

Cellphones have seen one of the most dramatic technological growths of any hardware in recent history. From simple portable phones a few decades ago, they’ve become fully-fledged computers with their own OS and applications used daily by most people worldwide. Smartphones have become such a fixture of life, and hackers and scammers have been working to exploit these devices for personal gain. With...
Blog

Wi-Fi Pineapple: What Do You Know About this Cyber Security Threat?

Carrying out a cyber attack is becoming more and more accessible. For a meager price of $99, anyone can now buy a platform to steal personal data and pose a cyber threat to organizations worldwide. This accessibility is made possible through the Wi-Fi Pineapple. Learn about this new cyber threat in this article and get tips on protecting your organization. What is a Wi-Fi Pineapple? A Wi-Fi...