Blog
How to Protect Your Data from the Microsoft Office 365 Phishing Scam
Fri, 07/31/2020
Since December 2019, there has been a coordinated campaign of phishing attempts targeting Office 365 users. Cyber criminals have sent spoofed email, gathering the login credentials and payment details of Microsoft accounts in over 62 countries.
According to one report, despite a 42% reduction in phishing attempts in 2019, scams like this Microsoft Office 365 campaign remain a significant threat...
Blog
How to Successfully Manage Repeat Clickers
Fri, 06/12/2020
(7 min read)
Using online security awareness training to lower your click rate
Recognizing a potential phishing email is the first step in avoiding falling victim to a cyber attack. The next and most important step is knowing what to do with this email.
Ideally, you want your employees to report the phishing email to you and then delete the message. However, curiosity is extremely powerful....
Press Release
Terranova Security Partners with Microsoft
Thu, 02/20/2020
Bringing the Best in Security Awareness Content to Microsoft Customers
Terranova Security has announced that it has partnered with Microsoft
Microsoft is leveraging our phishing, security awareness, social engineering, and cyber security content in Microsoft Office 365 Advanced Threat Capabilities (Office 365 ATP).
“Microsoft’s technology and platform enriches us with intelligent insights to...
On-Demand Webinar
How Does Your Click Rate Stack Up?
Benchmarking statistics related to phishing simulations are critical for driving behavioral change.
Based on the recent results of the 2019 Gone Phishing Tournament, learn how the click rate data gathered reinforces the importance of implementing a program that combines rich and engaging content for security awareness training and phishing simulations based on real-life scenarios.
You will also...
On-Demand Webinar
Everything You Ever Wanted to Know About the GDPR
DURATION: 45 MINUTES
During this webcast, you will learn more about the GDPR's key concepts and principles, as well as the personal data rights protected under this regulation.
Watch the GDPR webcast and reduce the risk of facing penalties for non-compliance!
During this free webcast, learn more about:
What is the GDPR?
Who is impacted?
Why...
Blog
Governance and Information Security
Thu, 02/13/2014
Information security governance is a subset of corporate governance and can complete or encompass the governance of information technologies. It directs or strategically aligns information security activities and ensures that the company’s business objectives are reached. It also guarantees that information security risks are adequately managed and that information resources are used responsibly.
...
Blog
Business Continuity Management Program BCM (part 2)
Tue, 09/17/2013
As a follow up to the Business Continuity Management program article, here is a more detailed description of the development and implementation phase objectives and content of the Business Continuity Plan (BCP) for major incidents. This plan is in fact a set of plans which is comprised of the following main components:
Emergency action plan and damage assessment
This is a response plan to deal...
Blog
Supplementary guide to achieving PCI-DSS compliance cloud computing
Tue, 05/28/2013
Cloud computing services require special attention in regards to information security and privacy. This is especially important when using credit card data while cloud computing in order to meet PCI-DSS ("Payment Card Industry – Data Security Standard") standards. To this end, the SSC ("Standard Security Council") published a document entitled “Information Supplement: PCI DSS Cloud Computing...