blog-logo.png

A BLOG ABOUT CYBER SECURITY

Wombat Security is a leader in security awareness and training. Our blog covers the latest cyber security news, insights, and best practices. We arm infosec professionals with the knowledge and tools they need to improve end-user behaviors and reduce organizational risk.

The Latest in Phishing: First of 2017

Written by Kym Harper

We bring you the latest in phishing statistics and attacks from the wild.

Read More

Blog Topics

The Latest in Phishing: First of 2017

We bring you the latest in phishing statistics and attacks from the wild.

Read More

Put Less Emphasis on Phishing Trends, More Emphasis on Managing Risk

As we indicated in our recent 2017 State of the Phish Report summary, we noticed some positive trends with regard to the reported volume of phishing attacks, and these trends coincided with the numbers noted in the Anti-Phishing Working Group’s Phishing Trends Report, 3rd Quarter 2016, which was released in late December. The APWG headlined its report summary with “Record Wave of Phishing Comes to an Ebb in Autumn 2016” and noted several key comparison metrics:

Read More

New State of the Phish Report Shows Positive Trends, But End-User Risk Remains

We're excited to announce the release of the 2017 State of the Phish Report, our third-annual look at how end users are recognizing and responding to phishing attacks, and what infosec professionals are doing to mitigate the risks associated with this perennial threat.

Read More

Infographic: IoT Security Q&A and Checklist

The Internet of Things (IoT) is a hot topic for consumers and infosec professionals alike. Our experts have commented about the cybersecurity threats that are on the rise due to the proliferation of IoT devices — but that is certainly not halting the adoption and implementation of these products.

This holiday season, as more and more devices are activated and begin accessing personal and corporate data and systems, it's important to understand the implications of installing and using IoT products. The following Q&A and checklist can help you get a better grasp of the different types of IoT devices that are available in the marketplace and the steps you can take to ensure that your personal and business data are kept as secure as possible as you and your family members utilize this burgeoning technology.

Read More

Security Spotlight: Avoiding Holiday Shopping Scams

With the 2016 holiday shopping season soon to be in full swing, cybercriminals are working overtime to turn your deal hunt into a score for the bad guys.

Below, we outline a few perennial holiday shopping scams, as well as a couple of newcomers to the scene. Familiarize yourself with the warning signs associated with these hoaxes and our tips for avoiding them. Help make your holidays memorable for the right reasons, not the wrong ones.

Read More

Three Simple Steps for Securing Your Home WiFi Network

You may have heard (or read) of the dangers of connecting to free, open-access WiFi networks. But did you know that your home network can also be hazardous to your personal data? If you have not taken the proper security precautions, your home WiFi is likely to be just as vulnerable as the open wireless network at your corner coffee shop. Without the proper defenses, your network could be accessible to anyone with even a modest set of cyber snooping skills.

Read More

Why You Should Celebrate National Clean Out Your Computer Day

National Clean Out Your Computer Day has been recognized on the second Monday in February since 2000. It’s unlikely you’ll find a Hallmark card for it (though I guess you never know), but you should take some time to embrace the practical — and cybersecurity — benefits to reducing your digital footprint.

Read More

What Groundhog Day Can Teach Us About Security Awareness Training

Here in Southwestern Pennsylvania (with Punxsutawney a mere 80 miles up the road from our home town of Pittsburgh), Groundhog Day and its meteorological implications are big news. While many are likely to consider this tradition a bit…unconventional…Groundhog Day folklore was immortalized on film in a movie of the same name. In it, Bill Murray plays a Pittsburgh weatherman who ends up repeating Groundhog Day over and over again while trying to find the key to breaking the cycle.

Read More

A Key Cybersecurity Resolution for 2017: Collaborate More

With the turning of a new calendar page comes the tendency to take stock of the prior year and think ahead to how key aspects of business and personal lives might be improved in the coming months. As you ponder your plans for 2017, we encourage you to actively pursue opportunities to collaborate with external and internal entities. And before you write off the suggestion, consider this: Multiple experts state that while legitimate organizations and infosec professionals approach the idea of collaboration with concern and suspicion, cybercriminals have embraced the practice and are using shared intelligence to strengthen their operations and maximize the effectiveness of their attacks.

Read More

Awareness Video Campaigns Now Part of Our Security Awareness Training Portfolio

On February 7, we were excited to announce the launch of our new Awareness Video Campaigns, an addition to our Security Awareness Materials portfolio that will help our customers raise awareness and keep cybersecurity top-of-mind for their employees. The videos and their companion posters and images were developed in direct response to an interactive discussion with attendees at our 2016 Wombat Wisdom Security Awareness and Training Conference.

Read More

Where’s Wombat? Look for Us at Top Cybersecurity Events in 2017.

As you plan your travels for 2017, we hope you will consider connecting with us at one or more of the industry events we’ll be attending this year.

Read More

Wombat Thanks Customers, Industry for Record-Breaking 2016

Earlier this week, we were excited to publicly announce some of the results related to our record-breaking 2016, and we wanted to take this opportunity to share the news with you, our loyal readers and subscribers.

Read More
icon-book.png

Try Our Interactive Security Awareness Training Modules

Our 20+ interactive training modules in topics like Email Security, URL Training, Mobile App Security, and more are proven to change the behavior of end users and reduce risk.

Try Our Modules