Resources

Guide

The Definitive Guide to Security Awareness Training

Learn about the 4 pillars of successful security awareness training: High-Quality Content Personalized vs. Pre-Built Training Options Risk-Based and Role-Based Training Options Real-World Phishing Simulations
Blog

5 Examples of Spear Phishing Attacks

When it comes to cyber crime, hackers like to locate the most high-value targets, whether it’s a piece of infrastructure or an individual with access to privileged information, all while expending the least effort possible. In most examples of spear phishing attacks, a criminal will send out targeted attacks via email to multiple users. In these emails, the attacker will use high-pressure...
Blog

7 Types of Spoofing Attacks And How To Detect Them

Spoofing refers to an attack where hackers use various ways to disguise their identity so that their victims think they are talking to their coworker, boss, or business. The methods used to achieve this are the typical phishing tropes such as fake websites, links, and social engineering . When spoofing is involved, it’s often more helpful to focus on detecting the facade rather than looking at the...
Press Release

HelpSystems Acquires Terranova Security to Aid Global Customers in Building Localized Employee Security Awareness Training

Terranova Security helps users spot email phishing attempts and other cyberattacks through education and simulation available in 40+ languages MINNEAPOLIS (April 8, 2022) — HelpSystems ( now Fortra ) announced today the acquisition of Terranova Security, a leader in global phishing simulation and security awareness training. Available in more than 40 languages, Terranova Security’s platform and...
Blog

Top Examples of Malware Attacks

Malware is perhaps the most widely known out of all IT security threats. Since 1986, malware has become a significant concern for enterprise users, with recent examples including the Colonial Pipeline attack, Kaseya ransomware attack, and the SolarWinds Dark Halo breach. However, these attacks are just the tip of the iceberg, with many businesses falling victim to malware and ransomware attacks on...
Blog

How to Build a Successful Phishing Simulation Campaign

Phishing threats are everywhere, and if your employees don’t know how to spot them, you’re putting your information at risk. Knowing how to build a successful phishing simulation is vital for identifying how well employees can spot the latest threats and ensuring they know how to spot them independently. Unfortunately, many organizations fail to offer adequate security awareness training , with...
On-Demand Webinar

Terranova Security and Microsoft Present the Latest Global Phishing Benchmarks and Recommendations

Get the latest phishing benchmarking statistics from the 2021 Gone Phishing Tournament and learn how they can strengthen your security awareness initiatives in the coming year by attending the Phishing Benchmark Global Report Results webcast event. Terranova Security and Microsoft present highlights from the Tournament’s results and answer questions like: What geographic region had the best (and...
Blog

What You Need to Know About the Kaseya Ransomware Outbreak

In early July, IT solutions provider and remote management solution provider Kaseya announced that it had fallen victim to a supply chain ransomware attack. During the attack, hackers leveraged a vulnerability in Kaseya’s VSA platform to encrypt the data of hundreds of downstream MSPs and their clients. The Kaseya ransomware outbreak is one of the latest high-profile ransomware attacks targeting...
Blog

7 Important Takeaways from the 2021 Security Awareness Virtual Summit

On June 22nd, Terranova Security hosted the 2021 edition of the Security Awareness Virtual Summit. Sponsored by Microsoft, the virtual event boasted sessions featuring speakers from some of the cyber security industry’s most recognized entities, including the National Cyber Security Alliance (NCSA) and Gartner. The event’s lineup also featured a panel discussion featuring security awareness...
Blog

What You Need to Know About the Latest Facebook Data Leak

At the start of April, hackers leaked the data of 533 million Facebook users from 106 countries in an online hacking forum. The leaked data included the private information of Facebook users like full names, phone numbers, email addresses, locations, Facebook IDs, and biographical data. While hackers obtained the information in 2019, there are serious concerns over how cyber criminals could use...
Blog

Why Security Awareness Training is Business-Critical for the Logistics and Transportation Industries

Maintaining cyber security awareness is something that many companies struggle to maintain, particularly in the logistics and transportation sectors. Even though cyber crime poses an existential threat to these industries, awareness of threats like phishing attempts and ransomware remains low. As a critical infrastructure sector, the transportation sector is a critical component in the supply...
Blog

Security Awareness and Working From Home: What About Devices with Personal Voice Assistants?

Personal voice assistants have proven to be a great technological innovation that improves lives daily. With 4.2 billion of these devices in use in 2020 , they are no longer just a novelty, and, with workers staying home for the foreseeable future, voice assistants could pose a sizeable security risk. Voice assistants are mostly known as standalone speakers that people talk to in order to execute...
Blog

How to Protect Against Identity Theft

Imagine waking up one day and the organizations you deal with – your bank, your workplace, the tax office, your educational institution – don’t recognize you as you. Sounds like science fiction, right? In its extreme version, it is. But versions of this story are playing out for people and organizations daily as incidences of identity theft occur more frequently around the world. In 2022, the...
Blog

What You Need to Know About The Office-365 Phishing Campaign Targeting C-Suite Executives

During the last week of January 2021, cyber security provider TrendMicro shared a blog post highlighting an Office-365 phishing campaign that criminals have targeted executives within manufacturing, tech, real estate, government, and finance since May 2020. As part of the scam, fraudsters sent the victims fake emails with links to a phishing site, where they harvested their credentials to sell...
On-Demand Webinar

Terranova Security and Microsoft Present Global Phishing Benchmarks and Recommendations

Get the latest phishing statistics from the 2020 Gone Phishing Tournament and learn how to leverage them to help your organization strengthen security awareness initiatives. Watch the Phishing Benchmark Global Report Results webcast. Theo Zafirakos of Terranova Security and Brandon Koeller from Microsoft present highlights from the Tournament’s results and answer questions like: What industry is...
blog

Spear Phishing vs. Phishing: Everything You Need to Know

Spear phishing occurs when cyber criminals deploy targeted attacks against individuals and businesses alike via email. Using savvy tactics, hackers collect sensitive data about specific parties to construct messages that sound familiar and trustworthy. As its name implies, spear phishing falls under the larger umbrella category of phishing attacks that victimize end users and organizations daily...
Blog

How To Build a Strong Security Awareness Program in 2021

Discover security awareness trends and best practices for 2021 Your employees are your first line of defense against cyber security attacks. The strength of your security awareness program depends on every employee in your organization. As part of your organizational goals and plans for 2021, you need to prioritize building a cyber secure and aware culture. This requires an ongoing commitment from...