Resources

Blog

Got Malware? The Risk of Buying This Smart ID Card Reader from Amazon

KrebsOnSecurity blog recently reported on a popular, low-cost Common Access Card (CAC) reader available on Amazon that came with drivers infected by malware . A compromised smart ID card reader can bring severe consequences to both government and private organizations. It gives hackers an easy backdoor means of infiltrating networks and systems, which can leave sensitive information vulnerable to...
Blog

Is Your Personal Data Safe on Meta’s Social Media Platforms?

Not only are they burning through cash as they pivot toward the metaverse, but their struggles with data privacy are an ongoing issue. In many ways, Facebook/Meta’s data privacy troubles began in 2018, with revelations that a data-marketing firm had illegally collected the personal details of more than 80 million Facebook users. However, despite promises of improvements and changes in corporate...
Blog

Cyber Attacks Pose the Biggest Risk to UK Banks – Bank of England

This financial sector’s reliance on computer systems and network has made it an attractive target for cyber attacks, now the biggest risk to the UK financial system. In its latest Financial Stability Report , the Bank of England (BoE) agrees that cyber threats may be prevalent in 2023. The BoE said that it is working to strengthen defenses against cyber attacks. The report identified three...
Blog

How to Transition from Data Protection to Cyber Culture

The way we think about data protection is changing. Cyber culture is emerging as the new norm, and organizations must adapt their strategies to stay ahead of the curve. Data protection has traditionally focused on preventing breaches and protecting sensitive information. However, cyber culture goes beyond this by encompassing all aspects of online life. It includes everything from how we interact...
Blog

How to Protect Your Sensitive Information from Word Document Malware

If you’re a company that uses email scanning technology as the first line of cyber defense, you should know about a recent slate of malicious Word document-based attacks. These attacks are designed to deliver malware and ransomware to targeted systems. Security researchers at Cisco Talos recently identified an attack where Word document files attached to emails were used to deliver Cobalt Strike...
Blog

Holiday Tips

Use a virtual private network (VPN). Speak to your manager or IT department for software recommendations or guidance on the installation process. Create strong passwords When creating an online account, follow these simple steps: Don't use easy-to-find personal data (such as your birth year) Don't reuse passwords Use a combination of at least 8 letters, numbers, and symbols Phishing Look for...
Blog

What You Need to Know About the 2022 Australian Cyber Attacks

There is a sharp rise in cyber attacks targeting businesses and organizations across Australia. The nature of these attacks ranges from ransomware and phishing scams to distributed denial-of-service (DDoS) attacks, with some estimates suggesting that the number of cyber incidents could be as high as one million per year. The financial cost of these cyber attacks is immense, with businesses and...
Blog

Gift Card Scams: How to Easily Spot and Avoid These Cyber Threats

Did you know that gift card scams are among the most popular cyber threats? The same things that make gift cards popular with consumers—convenience and ease of use—also make them attractive to scammers as a vehicle for fraud. Gift cards, also known as gift certificates or vouchers, have topped the list of reported fraud payment methods every year since 2018, according to the Federal Trade...
Blog

The Recent Dropbox Breach and What We Can Learn From It

On November 1st, 2022, Dropbox became the victim of a cyber attack where source code repositories, as well as names and emails of their employees, were unauthorizedly accessed. It is not yet clear how the unauthorized access took place, but Dropbox has said that they are investigating the matter. The company is urging all users to change their passwords as a precautionary measure. This breach...
Blog

13 Online Shopping Tips to Stay Safe During Black Friday and Cyber Monday

During the annual eCommerce bonanza known as Black Friday and Cyber Monday weekend, shopping websites will be swarming with people who are mostly unaware of cyber threats that can leave personal data vulnerable. In 2021, Europe, Canada, and the United States saw a 50% spike in transactions during the Black Friday and Cyber Monday window from the previous week. With the imminent spike in online...
Blog

5 Ways Your Organization Should Take Advantage of Cyber Security Awareness Month

With an ever-increasing threat complexity across the cyber threat landscape, Cyber Security Awareness Month (CSAM) provides an opportunity to reflect on how enterprises can enhance their defenses and educate employees on cyber security best practices. Few areas are as important to focus on as security awareness. As part of the 2021 Gone Phishing Tournament , launched during CSAM, Terranova...
Guide

From Data Protection to Cyber Culture

Using security awareness training to build strong cyber security into your organizational culture is crucial to keep sensitive information safe. But is your awareness training program resonating with employees? Terranova Security, in collaboration with recognized research firm IPSOS, answer this question and many more in this new report that truly reflects employee attitudes towards security...
Blog

Bell Canada Cyber Attack: What You Can Learn from This Data Breach

On September 15, the Hive ransomware group claimed to have launched an attack against Bell Technology Solutions on August 20, 2022. The compromised information contained approximately 1.9 million active email addresses, 1,700 names, and active phone numbers. Bell Technology Solutions is a subsidiary of Bell Canada, a leading communications company and communications provider for over 140 years...
Blog

How to Choose the Best Security Awareness Training Topics for Your Training Program

The secret of any good security awareness training program is teaching your employees how to mitigate the threats they’re most likely to encounter in the workplace. To do this, you need to choose your security awareness training topics carefully. No two organizations have the same infrastructure, vulnerabilities, or user access policies to sensitive data, so there’s no one-size-fits-all training...
Blog

What are Email Security Gateways and Why are They Important?

Whether deployed as a cloud service or on-premises, email security—and especially email security gateways—is of growing importance to organizations of all sizes, particularly given the upheavals to the working world over the last several years. It is estimated that in the post-pandemic world, one quarter of the workforce will choose to permanently work remote. In some sectors, such as technology...
blog

5 Ways to Be Prepared for QR Code Scams

Restaurant menus worldwide have been replaced by QR codes stuck to the table during the COVID-19 pandemic. Physical menus were judged too difficult to clean and could act as infection vectors. Since everyone has a smartphone nowadays, QR codes were attractive alternatives instead of asking clients to type in the restaurant’s URL on their phones. Before, QR codes were mainly used for advertising...
Guide

2021 Phishing Benchmark Global Report

The Phishing Benchmark Global Report provides organizations everywhere with data-driven insights from the latest Gone Phishing Tournament™, a free annual cyber security event that coincides with Cybersecurity Awareness Month. Drive effective behavior change and strengthen your security awareness training initiatives with in-depth benchmarking data and expert guidance.
blog

What is Trap Phishing?

Trap phishing is one of the most valuable intelligence-gathering tools cyber criminals have at their disposal. Hackers routinely send out emails, phone calls, and messages to trick the recipients into handing over personal information, clicking on a web link,or downloading a malicious attachment and infecting their device. These trap phishing attacks, more commonly referred to as phishing scams...
Blog

What is a Zero Trust Access Network

None of the innovations seen in workplaces over the years posed challenges as significant as remote work. Even before hybrid workforces were the norm, many companies worldwide found themselves consolidated in large multinationals with employees all over the globe. The leading problem companies face, no matter the industry, is giving all their employees the same working experience, regardless of...