Blog
6 Things to Learn from the Garmin Security Breach
Fri, 02/03/2023
As much as we can say that cyber security measures are advancing, we can say the same about cyber criminals and their strategies.
In 2022, ransomware attacks occurred every 11 seconds on average, at a global annual cost to businesses and governments of $20 billion US.
Costs are rising in part due to the growing ransoms demanded from victims. While estimates of the average ransomware payout in...
Blog
The Nine Elements Impacting Cybersecurity Awareness
Tue, 07/30/2019
The MINDSPACE framework: What factors influence human behavior?
Even when your company has the best technology and the most efficient security controls, it still has to invest in the human factor. Regardless of the methods a company adopts, nothing can be accomplished unless users of the technology are motivated and able to apply the methods effectively. According to a recent study, a...
Blog
How to Successfully Manage Repeat Clickers
Tue, 06/25/2024
Managing repeat clickers is critical to maintaining robust organizational security, as these individuals significantly increase the risk of successful phishing attacks.According to a recent analysis of 6,000 employees receiving simulated phishing emails, about 6% of users were responsible for approximately 29% of the failures.Recognizing this could help maximize the return on investment (ROI) of...
Why Choose Fortra
Discover why organizations place their trust in Fortra’s Terranova Security to transform employees’ unsafe digital behaviors, mitigate cyber risks, and safeguard critical data.
On-Demand Webinar
How To Set Security Awareness Strategic Goals, KPIs And Metrics
Wed, 09/24/2025
...
Blog
Scam by fraudsters – Ransomware
Wed, 07/10/2013
Ransomware is one the many scams that Internet users dread. Once this type of malicious program is installed, it asks the user for “ransom” to unlock the computer, using various pretexts and pretending to be a local police authority.
In one case, a user clicked on a malicious link and was bombarded with pornographic pop-ups. The user attempted to restart his computer, when he received a message...
Blog
Governance and Information Security
Thu, 02/13/2014
Information security governance is a subset of corporate governance and can complete or encompass the governance of information technologies. It directs or strategically aligns information security activities and ensures that the company’s business objectives are reached. It also guarantees that information security risks are adequately managed and that information resources are used responsibly.
...
Blog
Impending breach notification laws highlight importance of security awareness
Tue, 01/27/2015
New data breach notification proposals from President Obama and other political leaders will only exacerbate the impact of these incidents.
The stakes surrounding cybersecurity aren’t just increasing – they are expanding.
For years now, business leaders have understood that data breaches are a serious issue, one which firms must do everything in their power to avoid. After all, these incidents...
Blog
The Security Risks of Improper Employee Offboarding and How to Prevent It
Fri, 03/17/2023
Employees come and go for a variety of reasons. If you’re lucky, they’ll be very cooperative with the offboarding process, but this isn’t always the case. And even if they are, you still have to take it with a grain of salt. Some say that calm and cooperative offboarding is often the most dangerous because people aren’t as diligent when the situation seems lax.
If these moments have any...
Blog
The California Privacy Rights Act (CPRA) and How it Affects Your Business
Thu, 03/23/2023
New regulations are already keeping IT professionals on their toes in 2023. One monumental change for California residents and businesses is the California Privacy Rights Act (CPRA).
The legislation came into force on January 1, 2023. Legislators drafted the new rules to empower consumers and close gaps in the California Consumer Privacy Act (CCPA).
The CPRA gives customers more control over...
Blog
Why Organizations Need Data-Centric Security Strategies
Mon, 05/22/2023
Many employees are celebrating the recent shift to remote and hybrid work. However, some security specialists and compliance experts are not as thrilled. Digitalization, cloud computing, and Software as a Service (SaaS) bring new freedom and flexibility to organizations and workers.
At the same time, they send data out into the wild beyond traditional security perimeters. There is a lot of...
Blog
Examining The 2020 Healthcare Ransomware Surge
Fri, 11/06/2020
How to Protect Against Ryuk Ransomware
As countries worldwide struggle to come to grips with the Covid-19 pandemic, attackers have attempted to capitalize by launching a wave of ransomware attacks on hospitals across the U.S. and Canada. These attacks have taken place in locations ranging from New York, Nebraska, Ohio, Missouri, and Michigan, to Montreal, by using Ryuk ransomware.
But what is...
On-Demand Webinar
On-Demand Webcast: The Five Stages of Being Phished
Mon, 11/18/2019
When falling for a phishing scam, users usually go through one or more emotional stages including; denial, anger, bargaining, depression and acceptance.
Watch now to learn more about:
The 5 stages and how they affect the impact of a data breach
Using a security awareness program to help users become cyber aware
The role of just-in-time training and phishing simulations in effectively...
Blog
How to Protect Against Identity Theft
Thu, 02/25/2021
Imagine waking up one day and the organizations you deal with – your bank, your workplace, the tax office, your educational institution – don’t recognize you as you. Sounds like science fiction, right? In its extreme version, it is. But versions of this story are playing out for people and organizations daily as incidences of identity theft occur more frequently around the world.
In 2022, the...
Blog
How Secure is Cloud Storage? Here are the Important Risks to Know
Fri, 12/29/2023
The rise of cloud storage has enabled much of the rapid digital transformation people have experienced since the onset of the pandemic. Forecasts project that today’s $83.41 billion global market will explode to $376.37 billion by 2029.
While cloud storage opens many opportunities to streamline processes and productivity, let’s keep in mind the arduous risks it poses.
Skyhigh Security found that...
Blog
Cyber Security Threats in the Auto Industry and How to Prevent Them
Mon, 06/26/2023
Transportation plays a vital role in our daily lives, getting us to work, school, and social activities. In many regions, cars have become the primary mode of transportation, shaping the urban landscape and influencing how we interact with our environment.
For many people, owning a car is not only a convenience but a necessity in navigating the modern world.
Over the years, cars have...