On-Demand Webinar
Fortra’s Terranova Security Q4 Product Roadmap Webinar
Tue, 12/10/2024
Catch up on the insights shared by our product leaders in this engaging webinar. Watch the recording below to explore how these updates can strengthen your security training program.What’s covered:The latest product enhancementsAI-focused Content Bundle updatesNew license management featuresA preview of features arriving in 2025Get practical updates to support your...
Blog
19 Phishing Email Examples
Mon, 08/19/2024
Phishing attacks work because people don’t know what phishing looks like. These examples of phishing emails emphasize how easy it is to be tricked.
Blog
130 Cyber Security Statistics: 2024 Trends and Data
Mon, 08/12/2024
Cybersecurity awareness is an everyday job, and it’s easy to fall into a false sense of security once you have a solid plan in place. Every year, statistics are a reminder that hackers and scammers never sleep. New trends and attack types pop up daily, making it difficult to keep track.This list is a rundown of the most important statistics of the year, providing a good overview of threats to keep...
Blog
Wi-Fi Pineapple: What Do You Know About this Cyber Security Threat?
Fri, 07/07/2023
Carrying out a cyber attack is becoming more and more accessible. For a meager price of $99, anyone can now buy a platform to steal personal data and pose a cyber threat to organizations worldwide. This accessibility is made possible through the Wi-Fi Pineapple. Learn about this new cyber threat in this article and get tips on protecting your organization.
What is a Wi-Fi Pineapple?
A Wi-Fi...
Blog
5 Ways Your Organization Should Take Advantage of Cyber Security Awareness Month
Thu, 10/20/2022
With an ever-increasing threat complexity across the cyber threat landscape, Cyber Security Awareness Month (CSAM) provides an opportunity to reflect on how enterprises can enhance their defenses and educate employees on cyber security best practices.
Few areas are as important to focus on as security awareness. As part of the 2021 Gone Phishing Tournament, launched during CSAM, Terranova...
Blog
9 Examples of Social Engineering Attacks
Fri, 11/29/2024
By definition, all examples of social engineering take advantage of human nature. Behaviors such as the willingness to trust others are exploited to trick individuals into divulging sensitive information.Social engineering has become the backbone of many cyber threats, from phishing emails to smishing and vishing attacks. This blog post will outline many popular social engineering techniques, some...
Blog
Safer Internet Day 2024: Keeping Everyone Safe and Secure Online
Mon, 02/05/2024
On February 6, 2024, we will celebrate Safer Internet Day with learning events dedicated to inspiring change and highlighting the importance of online safety. This year, we can expect activities from organizational and industry supporters, schools and government agencies, community groups, and business leaders.With cyber security risks rising, Safer Internet Day is an opportunity to raise...
Blog
Bring Cybersecurity Awareness Month to Life with These Engaging Tools and Tips
Mon, 10/07/2024
Cybersecurity is always a priority, but October—Cybersecurity Awareness Month (CSAM)—gives you the perfect chance to ramp up your efforts and engage your employees and third-party partners more. It’s an ideal time to spotlight the importance of security and try out some new, creative ways to build lasting awareness.In this article, we’ll explore effective tools and techniques for maximizing CSAM...
On-Demand Webinar
2023 Gone Phishing Tournament Results Webinar
Watch the panel discussion break down the latest phishing statistics from the 2023 Gone Phishing Tournament and learn how to leverage them to help your organization strengthen security awareness initiatives.
Human Risk Management
Simplify how you implement, manage, and optimize security awareness training with services from Fortra.
Human Risk Management Catalog
Enjoy the industry’s highest-quality human risk management experience with courses that distill everything your organizations needs to change end user behaviors and ensure your sensitive information is safeguarded from cyber criminals.
Blog
From Awareness to Action: Embracing Human Risk Management in Cybersecurity
Tue, 08/26/2025
When employees see security programs as a sign of organizational care, participation and impact can soar. Learn how Fortra helps you plan, launch, and optimize your human risk program. From role-based training and gamified learning to phishing simulations and SOC-backed suspicious email analysis, Fortra helps your users become active defenders.
Video
Ransomware: Move from Beware to Be Aware!
Tue, 12/04/2018
DURATION: 40 MINUTES
Do you fear that your organization’s data will be kidnapped and held for ransom?
It is critical for CISOs and security teams to have the right methods, tools and techniques to stop ransomware from infecting their environment. An effective approach goes beyond technology and processes—it needs to include the human factors that contribute to ransomware risks.
Do you have a...
Terms of Use
Access to, and use of, the Products and Services (as defined below) is subject to and expressly conditioned upon acceptance of these terms of use (the “Agreement”) by the entity identified in the applicable Purchase Agreement (the “Customer”). This Agreement is a legally binding document effective as of the date of its acceptance by Customer (the “Effective Date”) entered into between Customer and...
Blog
Consumerization of IT Through BYOD: Is Your Company Ready?
Mon, 03/03/2014
The consumerization of IT is when employees use their own personal mobile devices, such as laptop computers, tablets, smart phones, etc. at work, referred to as BYOD (bring your own device). This use is becoming increasingly common and exposes companies to a variety of risks, including the protection of personal information.
Canadian businesses appear to be leading the world in IT consumerization...
Blog
How to Create a Strong Password in 7 Easy Steps
Fri, 03/29/2024
Regardless of your industry or organization’s built-in cyber security protection level, simple passwords are trouble for your employees, network, and sensitive data. With 44% of users reporting recycling passwords across personal and business-related accounts, it's no wonder why stolen credential databases continue to fetch high prices on the dark web...
Blog
Becoming a Cybersecurity Pro: The 10 Qualities You Need to Succeed
Mon, 04/03/2023
Cyber security is one of the fastest-growing fields in technology, and with the number of cyber attacks increasing every year, it’s no wonder why it’s also one of the fields hiring the most.
Nowadays, almost every company needs a cyber security department to protect its data from hackers and scammers. Cybercrime magazine estimates there will be over 3.5 million cyber security job openings in the...