Resources

Datasheet

Human Risk Management

Fortra Human Risk Management (HRM) helps organizations reduce human-related security risks by promoting safe user behaviors. Backed by security experts, HRM offers realistic training and simulations based on actual social engineering tactics to effectively disrupt attack chains.
Datasheet

Managed Human Risk Management

Experience the Advantages of Fortra Managed ServicesWith Fortra Managed Services, you can maximize the effectiveness of your Human Risk Management program while minimizing the additional workload. This ensures your security awareness program runs smoothly with the assistance of Fortra’s experienced experts.Learn how Fortra Managed HRM can impact your human risk management program. DOWNLOAD PDF...
Datasheet

HRM Advisory Services

How Can HRM Advisory Services Help Your Organization? Changing security behavior and culture isn’t just about having a training platform – it’s about having a strategy. Success starts with a clear plan and direction regardless of a DIY or managed approach to security awareness training. Fortra Human Risk Management (HRM) Advisory Services can help with the guesswork and build a security awareness...
Blog

Phishing Has Changed: Are Your Users Prepared?

It’s no secret that cybercriminals use AI to craft high quality phishing emails, making traditional awareness training less effective. How can organizations adapt to these threats?What are the Changing Phishing Threats?Today, attackers hit inboxes from all fonts. They abuse trusted services to send phishing emails and host phishing sites on trusted domains. They use QR codes and hybrid vishing...
Blog

Phishing Awareness Training: Beyond the Basics

Phishing tactics are changing, and not for the better. At least, not for users. And AI is leading the charge in making vishing, smishing, and even spear phishing attacks more dangerous than ever.But is that all we have to worry about? They are leveraging artificial intelligence to its fullest potential, pushing the boundaries of what we once thought possible. Nowhere is this advancement more...
Blog

Why Security Awareness Programs Fail—and How to Fix It

Cybersecurity threats target systems, processes, and, increasingly, people. While technological defenses like firewalls and endpoint detection continue to advance, the human element remains a frequent entry point for attackers.According to Verizon’s most recent Data Breach Investigation Report, 68% of data breaches involve human factors—whether through error, negligence, or malicious actions.This...
On-Demand Webinar

Fortra’s Terranova Security Q4 Product Roadmap Webinar

Catch up on the insights shared by our product leaders in this engaging webinar. Watch the recording below to explore how these updates can strengthen your security training program.What’s covered:The latest product enhancementsAI-focused Content Bundle updatesNew license management featuresA preview of features arriving in 2025Get practical updates to support your...
Blog

12 Holiday Cyber Scams to Avoid

The holidays are about joy, connection, and giving—but it's prime hunting season for cybercriminals. While you're finding gifts for loved ones, scammers are crafting fake emails, bogus websites, and malicious links to steal your personal information. From phishing schemes to malware traps, their tactics are designed to catch you off guard. Cyber scams surge during Black Friday and holiday shopping...
Blog

9 Examples of Social Engineering Attacks

By definition, all examples of social engineering take advantage of human nature. Behaviors such as the willingness to trust others are exploited to trick individuals into divulging sensitive information.Social engineering has become the backbone of many cyber threats, from phishing emails to smishing and vishing attacks. This blog post will outline many popular social engineering techniques, some...
Blog

How Response-Based Scams Evade Detection and What You Can Do to Prevent It

Phishing has become the most common cyber threat, leading organizations to update their defenses with tools like detection systems and targeted security awareness training.Cybercriminals are constantly evolving, finding new ways to bypass security measures. This ongoing cat-and-mouse game underscores the importance for companies to remain vigilant and adaptable.One particularly concerning tactic...
Blog

Overcoming Challenges in Remedial Training for Cybersecurity Awareness

Remedial training is a type of training specifically focused on individual employees who struggle to understand and abide by specific cybersecurity concepts. While this type of training can be very beneficial, it has a few pitfalls that must be dealt with to get results.This article will explain the most common challenges of remedial training programs and provide helpful tips to overcome them....
Blog

Bring Cybersecurity Awareness Month to Life with These Engaging Tools and Tips

Cybersecurity is always a priority, but October—Cybersecurity Awareness Month (CSAM)—gives you the perfect chance to ramp up your efforts and engage your employees and third-party partners more. It’s an ideal time to spotlight the importance of security and try out some new, creative ways to build lasting awareness.In this article, we’ll explore effective tools and techniques for maximizing CSAM...
On-Demand Webinar

The $25M Supply Chain Hack: Security Breach Podcast

Supply chain attacks are on the rise, with nearly 20% of organizations reporting breaches linked to vulnerabilities within their supply chains, according to IBM’s Cost of a Data Breach Report. These attacks come with a hefty price tag, averaging nearly $4.5 million per incident, and they often take longer to detect and resolve than other types of breaches.Join us in an insightful discussion with...