Blog
Securing Your Organization’s Reputation from Brand Impersonation Attacks
Fri, 08/09/2024
Phishing attacks are becoming increasingly sophisticated. Over 51% of the time, email attackers pretend to be one of the top 20 global brands, with Microsoft being the most common impersonation.Picture this: one of your users receives an email that appears to be from a trusted partner or a commonly used service. The branding is accurate, the language is convincing, and the email seems legitimate....
Blog
How to Successfully Manage Repeat Clickers
Tue, 06/25/2024
Managing repeat clickers is critical to maintaining robust organizational security, as these individuals significantly increase the risk of successful phishing attacks.According to a recent analysis of 6,000 employees receiving simulated phishing emails, about 6% of users were responsible for approximately 29% of the failures.Recognizing this could help maximize the return on investment (ROI) of...
Blog
Top 11 Cybersecurity Concerns in the Finance Sector in 2024
Wed, 06/12/2024
Cybersecurity in finance is not just about defense but proactive adaptation. Banks face continuous threats despite advanced security infrastructures. The escalation in phishing success rates, as seen in Terranova Security's 2023 Gone Phishing Tournament found a 10.4% click-through statistic, highlighting the need for evolving security strategies.
While the finance sector performed better than...
On-Demand Webinar
2023 Gone Phishing Tournament Results Webinar
Watch the panel discussion break down the latest phishing statistics from the 2023 Gone Phishing Tournament and learn how to leverage them to help your organization strengthen security awareness initiatives.
Blog
What is Baiting in Cyber Security?
Mon, 03/04/2024
Cyber criminals are constantly evolving their methods, but their biggest leverage for growth will always be exploiting the human factor. Software and physical measures against cyber attacks have become so advanced that tricking workers is the only remaining attack vector criminals can reliably use.
According to Verizon’s 2023 Data Breach Report, 74...
Blog
What is Quishing?
Fri, 02/09/2024
QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives.
The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes, easily generated and cost...
Blog
The 5 Most Common Supply Chain Attacks
Thu, 01/25/2024
Say, have you heard anything about supply chains lately? Of course, you have. This phrase has entered the zeitgeist with more gusto than Taylor Swift oozing rizz in a Chiefs jersey.
When we talk about the price of things, be they groceries or concert tickets, the conversation inevitably turns to someone remarking on “the supply chain,” and the rest of us nod knowingly.
Which is to say, supply...
Blog
How to Avoid Phishing Simulations False Positives?
Fri, 11/03/2023
This year is seeing more phishing attacks in more places, having more detrimental impacts. One security messaging provider noted a 61% increase in phishing attacks between April and October 2022 compared to the same period the previous year.
Another report observed that when phishing attacks were successful in 2022, financial losses from those incidents increased by 76%.
In another trend,...
Blog
The Chain Reaction: Why Cyber Security in Supply Chain Networks is Critical
Fri, 09/15/2023
Imagine countless organizations working together like a well-oiled machine to create and deliver the products and services we rely on. That’s what supply chain networks are.
Like a machine, each connection is vital to make the whole thing work. It’s a delicate dance of supply and demand, where each organization plays its part in keeping the network alive and thriving.
And with technology...
Case Study
Worldwide Manufacturer Creates Cyber-Aware Culture And Prevents Phishing Attacks With Security Awareness Training
Learn how a global manufacturing company shrunk its phishing email click rates by more than 20% after implementing security awareness training.
Blog
How to Build a Successful Phishing Simulation Campaign
Thu, 02/24/2022
Phishing threats are everywhere, and if your employees don’t know how to spot them, you’re putting your information at risk. Knowing how to build a successful phishing simulation is vital for identifying how well employees can spot the latest threats and ensuring they know how to spot them independently.
Unfortunately, many organizations fail to offer adequate security awareness training, with...
Video
How Security Awareness Training Targets and Changes User Phishing Behaviors
Thu, 10/08/2020
Learn the secrets behind effectively managing the human element of cyber security -- watching the Terranova Security presentation from the 2020 Forrester Security and Risk Virtual Forum on-demand!
This presentation, from author and Terranova Security's Lise Lapointe, includes expert insight into:
Why high-quality content that’s available in multiple formats, accessible to all users, and...
On-Demand Webinar
The $25M Supply Chain Hack: Security Breach Podcast
Supply chain attacks are on the rise, with nearly 20% of organizations reporting breaches linked to vulnerabilities within their supply chains, according to IBM’s Cost of a Data Breach Report. These attacks come with a hefty price tag, averaging nearly $4.5 million per incident, and they often take longer to detect and resolve than other types of breaches.Join us in an insightful discussion with...