blog-logo.png

A BLOG ABOUT CYBER SECURITY

Wombat Security is a leader in security awareness and training. Our blog covers the latest cyber security news, insights, and best practices. We arm infosec professionals with the knowledge and tools they need to improve end-user behaviors and reduce organizational risk.

New State of the Phish Report Shows Positive Trends, But End-User Risk Remains

Written by Gretel Egan

We're excited to announce the release of the 2017 State of the Phish Report, our third-annual look at how end users are recognizing and responding to phishing attacks, and what infosec professionals are doing to mitigate the risks associated with this perennial threat.

Read More

Blog Topics

New State of the Phish Report Shows Positive Trends, But End-User Risk Remains

We're excited to announce the release of the 2017 State of the Phish Report, our third-annual look at how end users are recognizing and responding to phishing attacks, and what infosec professionals are doing to mitigate the risks associated with this perennial threat.

Read More

SecureWorld Webinar Offers Preview of Wombat’s 2017 State of the Phish Report

On Wednesday, January 11, Wombat CTO Trevor Hawthorn participated in SecureWorld’s “State of the Phish 2017 – A 360-Degree View” webinar and gave a preview of our forthcoming 2017 State of the Phish Report. He was joined by fellow presenters Jake Bernstein, an attorney with Newman Du Wors, and Mitch Parker, Indiana University Health’s Executive Director of Information Security and Compliance.

Read More

Phishing Prevention: Don’t Become a Victim of Your Own Success

Phishing emails in their many forms — spear phishing messages, business email compromise (BEC) and whaling attacks, etc. — remain a preeminent threat to organizations and individuals worldwide. The most viable path to preventing phishing scams from hitting their mark is to utilize a combination of technical safeguards (like spam filters and blacklists) and ongoing end-user security awareness training. Those who downplay the potential benefits of employee security training are forgetting that successful social engineering attacks rely on one common factor: human engagement.

Read More

Infographic: IoT Security Q&A and Checklist

The Internet of Things (IoT) is a hot topic for consumers and infosec professionals alike. Our experts have commented about the cybersecurity threats that are on the rise due to the proliferation of IoT devices — but that is certainly not halting the adoption and implementation of these products.

This holiday season, as more and more devices are activated and begin accessing personal and corporate data and systems, it's important to understand the implications of installing and using IoT products. The following Q&A and checklist can help you get a better grasp of the different types of IoT devices that are available in the marketplace and the steps you can take to ensure that your personal and business data are kept as secure as possible as you and your family members utilize this burgeoning technology.

Read More

Security Spotlight: Avoiding Holiday Shopping Scams

With the 2016 holiday shopping season soon to be in full swing, cybercriminals are working overtime to turn your deal hunt into a score for the bad guys.

Below, we outline a few perennial holiday shopping scams, as well as a couple of newcomers to the scene. Familiarize yourself with the warning signs associated with these hoaxes and our tips for avoiding them. Help make your holidays memorable for the right reasons, not the wrong ones.

Read More

Three Simple Steps for Securing Your Home WiFi Network

You may have heard (or read) of the dangers of connecting to free, open-access WiFi networks. But did you know that your home network can also be hazardous to your personal data? If you have not taken the proper security precautions, your home WiFi is likely to be just as vulnerable as the open wireless network at your corner coffee shop. Without the proper defenses, your network could be accessible to anyone with even a modest set of cyber snooping skills.

Read More

A Key Cybersecurity Resolution for 2017: Collaborate More

With the turning of a new calendar page comes the tendency to take stock of the prior year and think ahead to how key aspects of business and personal lives might be improved in the coming months. As you ponder your plans for 2017, we encourage you to actively pursue opportunities to collaborate with external and internal entities. And before you write off the suggestion, consider this: Multiple experts state that while legitimate organizations and infosec professionals approach the idea of collaboration with concern and suspicion, cybercriminals have embraced the practice and are using shared intelligence to strengthen their operations and maximize the effectiveness of their attacks.

Read More

Infographic: IoT Security Q&A and Checklist

The Internet of Things (IoT) is a hot topic for consumers and infosec professionals alike. Our experts have commented about the cybersecurity threats that are on the rise due to the proliferation of IoT devices — but that is certainly not halting the adoption and implementation of these products.

This holiday season, as more and more devices are activated and begin accessing personal and corporate data and systems, it's important to understand the implications of installing and using IoT products. The following Q&A and checklist can help you get a better grasp of the different types of IoT devices that are available in the marketplace and the steps you can take to ensure that your personal and business data are kept as secure as possible as you and your family members utilize this burgeoning technology.

Read More

The Wombat Advantage: Our Free Perks Fuel Your Success

With the explosion of the cybersecurity market, there have been many newer entrants into the security awareness training space. There is naturally a lot to consider as you create your short list for employee security awareness training. Price is one of those factors — but there is often more to the bottom line than meets the eye. We know a lot of our competitors can’t match the free benefits that are included with our products. This is an edge that we call the Wombat Advantage.

Read More

New State of the Phish Report Shows Positive Trends, But End-User Risk Remains

We're excited to announce the release of the 2017 State of the Phish Report, our third-annual look at how end users are recognizing and responding to phishing attacks, and what infosec professionals are doing to mitigate the risks associated with this perennial threat.

Read More

SecureWorld Webinar Offers Preview of Wombat’s 2017 State of the Phish Report

On Wednesday, January 11, Wombat CTO Trevor Hawthorn participated in SecureWorld’s “State of the Phish 2017 – A 360-Degree View” webinar and gave a preview of our forthcoming 2017 State of the Phish Report. He was joined by fellow presenters Jake Bernstein, an attorney with Newman Du Wors, and Mitch Parker, Indiana University Health’s Executive Director of Information Security and Compliance.

Read More

Phishing Prevention: Don’t Become a Victim of Your Own Success

Phishing emails in their many forms — spear phishing messages, business email compromise (BEC) and whaling attacks, etc. — remain a preeminent threat to organizations and individuals worldwide. The most viable path to preventing phishing scams from hitting their mark is to utilize a combination of technical safeguards (like spam filters and blacklists) and ongoing end-user security awareness training. Those who downplay the potential benefits of employee security training are forgetting that successful social engineering attacks rely on one common factor: human engagement.

Read More
icon-book.png

Try Our Interactive Security Awareness Training Modules

Our 20+ interactive training modules in topics like Email Security, URL Training, Mobile App Security, and more are proven to change the behavior of end users and reduce risk.

Try Our Modules