Blog
INFOGRAPHIC: How to Protect Your Data from Ransomware Attacks
Wed, 09/27/2023
Ransomware can take on multiple forms. From phishing emails or USB keys containing malicious files to downloaded files from the internet, ransomware takes over your computer and holds your data hostage. Here are 7 tips for prevention.
IBM i Cloud Migration Bundle
The increasing IBM i skills gap and the desire to eliminate the costs of operating a data center continue to encourage IBM i customers to begin their cloud journey. Migrating IBM Power workloads is a multifaceted process in which many IT teams have little to no experience performing. Our cloud migration bundle offers you the tools as well as the personnel necessary to successfully migrate to the c...
News Article
VM Blog: National Insider Threat Awareness Month 2023 Expert Roundup
By Wade Barisoff on Fri, 09/22/2023
Nowadays, insider threats have become a critical concern for organizations. In the scope of National Insider Threat Awareness Month, Wade Barisoff spoke with VM Blog about the importance of insider threat awareness, and shared valuable insights on how organizations can address these threats.
Blog
INFOGRAPHIC: How to Protect Your Data from Spoofing Attacks
Tue, 09/19/2023
A social engineering attack needs only one thing to be successful: the trust of the targeted party. Here are 7 ways to protect against email spoofing.
Blog
INFOGRAPHIC: How to Protect Your Data from Smishing and Vishing
Mon, 09/11/2023
Smishing and vishing attacks can dupe even the most vigilant users with persuasive, convincing text and voice messages. Here are 6 ways to prevent these types of attacks.
Guide
From Data Protection to Cyber Culture
Is your awareness training program resonating with employees? Terranova Security, in collaboration with recognized research firm IPSOS, answer this question and many more in this new report that truly reflects employee attitudes towards security awareness across the globe.
Guide
The 2022 Phishing Benchmark Global Report
Drive effective behavior change and strengthen security awareness initiatives with in-depth phishing benchmarking data.
News Article
Security Weekly: Email Impersonation Threats Reaching Corporate Inboxes Hit An All-Time High
By John Wilson on Mon, 08/21/2023
During his recent interview with SC Media Security Weekly Podcast, John Wilson delves deep into threat actors' common techniques and shares strategies for defending against email impersonation.
Security Awareness Training
Discover why security awareness training is an essential component of success cybersecurity, best practices and how Fortra's Terranova Security can help.
Blog
INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks
Wed, 08/02/2023
Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
Blog
The Benefits of Automating IBM i Spool File Conversion and Delivery
By Greg J. Schmidt on Wed, 06/14/2023
Discover how automating your IBM i spool file management and delivery can make your data more accessible to users and easier to deliver for administrators.
News Article
Technology Record: Theo Zafirakos on Using Simulation for Cybersecurity
Improving user behavior and implementing interactive education can lower the risk of cyberattacks and help foster a security-conscious organizational culture.
Press Release
Fortra’s Alert Logic Wins Fortress Cybersecurity Award for Threat Detection
Fortra's Alert Logic Managed Detection and Response (MDR) has won a 2023 Fortress Cybersecurity Award for threat detection services. Fortra’s Terranova Security was recognized as a finalist in the category for security awareness training.
On-Demand Webinar
Discover Easy and Affordable High Availability
Watch as our IBM i experts showcase how easy it is to navigate Robot HA, the simplicity it brings to creating new rules, and why it's so affordable.
Blog
Security Awareness: The Groundwork of Cybersecurity Culture
Wed, 05/03/2023
It’s a big world out there, and cybercriminals know you don’t have time for everything. A common fallacy is that they’re lurking in dark basements, bending their brands to maximum capacity to create highly sophisticated exploits that blow any current security system out of the water. More often than not, they’re not.
Criminal hackers go after the...
On-Demand Webinar
How to Move from Legacy HA to Robot HA in 30 Days
Spend 30 minutes with us and see how a legacy high availability solution that makes your job difficult can be replaced with one that is simple, safe, and cost-effective.