Blog
How to Make a Network Map in 5 Easy Steps
Thu, 03/21/2024
Your network is complex, but creating a helpful, dynamic map doesn't have to be - learn how to create a network map with Intermapper.
Blog
Top 8 Benefits of Network Monitoring
Thu, 03/14/2024
Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
News Article
The AI Journal: From Criminal Pastime to Cybersecurity Tool
Thu, 03/14/2024
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
Guide
2023 Gone Phishing Tournament Report
Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
News Article
Cyber Defense Magazine: AI Is Revolutionizing Phishing for Both Sides
By Antonio Sanchez on Fri, 02/16/2024
AI is changing the game of phishing and making attacks sharper than ever. Combining AI capabilities with the human mind might be the secret to staying on top of the game.
Blog
Top Five Business Efficiency Goals You Can Achieve with a Document Management Solution (DMS)
By Greg J. Schmidt on Fri, 01/26/2024
Document Management Solutions (DMS) impact productivity and efficiency at nearly every level of modern business. Discover the top five business efficiency goals you can achieve with a DMS and how you can get started.
News Article
Technology Record Winter 2023 Issue: Fight Phishing With a Simulation Solution
By Mike Devine on Fri, 12/22/2023
Mike Devine spoke to Technology Record about security awareness program best practices and Fortra’s comprehensive anti-phishing strategies that help educate employees to recognize phishing attempts.
News Article
Comparitech: The Best Data Protection Training Tools for Employees
Wed, 12/13/2023
Fortra’s Terranova Security was included in Comparitech’s list of the best data protection training tools for employees.
Blog
Common Email Threats and How to Combat Them
By Antonio Sanchez on Wed, 11/29/2023
We let email threats slip by us every day. Discover what popular ploys your team might be missing and how Fortra’s advanced security solutions can help.
News Article
Technology Record: How to Guard Against the Dangers of AI
Thu, 11/23/2023
How can organizations stay safe in the age of AI? In this Technology Record article, Theo Zafirakos discusses the dangers of AI and provides expert insights on mitigating those risks.
On-Demand Webinar
Your Side of the AWS Shared Security Model
Tue, 11/21/2023
Discover the breadth of solutions that Fortra offers to help you with your side of the AWS shared security model.
News Article
Technology Record: Fortra’s Terranova Security Provides Accessible Cybersecurity Training for a Global Manufacturing Firm
Wed, 11/08/2023
Fortra’s Terranova Security helped a global manufacturing firm increase its international adoption rate of security training to 80 per cent.
News Article
U.S. News & World Report: 5 Warning Signs Your 401(k) Is Being Scammed
By Eric George on Mon, 10/09/2023
Your 401(k) is an important asset for a secure retirement, but it could be at risk of scams and fraud. Eric George spoke to U.S. News & World Report about how people can protect their 401(k) accounts.
News Article
eChannelNEWS Security Podcast: Building a Culture of Security Awareness with Fortra
Fri, 10/06/2023
Security is the responsibility of all employees, from the top down. Theo Zafirakos joined the eChannelNews Security Podcast to discuss how to best implement security awareness programs and the effective strategies for building a security-aware culture.
News Article
Journal of Cyber Policy: Even Cybersecurity Experts Get Scammed
By John Wilson on Thu, 10/05/2023
Cyber threats can target anyone, and even cybersecurity experts can fall victim to scams! In the article featured in the Journal of Cyber Policy, John Wilson shares his personal story and highlights the actions he took to prevent threat actors from using his data.