Wombat Security
Follow
60 Followers
Follow Wombat Security on their other social channels!
About Us
Founded:
2008
Company Size:
51-200 employees
Company Type:
Private
Location:
Pittsburgh, PA; USA
Website:
At Wombat Security, our mission is to deliver software-based cyber security awareness and training solutions that help your employees understand the risks associated with poor cyber hygiene and subsequently change their behaviors to strengthen your organization’s security posture. Our Continuous T ...
Read more
Promoted Content
The Rising Threat of Ransomware
Follow
4
Rethinking Patch Management Strategies to Balance Security and Uptime
Recently I was part of a panel discussion on combatting ransomware at the SecureWorld Atlanta event. An interesting conversation developed around the old stalwart of patching computers and systems. A solid patching process is one of the most elementary parts of an organization’s security program — or at least it should be.
Follow
12
User Risk Report Shows Marked Lack of Security Awareness Among Workers
Earlier this week, we released our 2017 User Risk Report, which features the results of a survey of more than 2,000 working adults — 1,000 in the US and 1,000 in the UK — who were asked about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying — but always enlightening. An interesting not ...
Follow
13
Ransomware and Phishing Attacks: Why Anti-Virus Software Can’t Save You
Installing and keeping anti-virus software up to date on computers and mobile devices has become a de facto cybersecurity best practice — and for good reason. Like other technical safeguards, anti-virus software has come a long way in its sophistication since its early days in the late 1980s and early 1990s. There are many reliable and reputable options for anti-virus and anti-malware protection for corporate organizations and personal devices, and they provide an important laye ...
Follow
29
Five Tips from CISOs for Managing Emerging Cybersecurity Threats
I recently had the opportunity to visit SecureWorld Atlanta 2017, where I met a number of industry experts and attended several sessions. One of those sessions was a panel discussion titled, “Hazards on the Horizon – Emerging Threats.” The panel of CISOs discussed both the current cyber threat landscape and offered advice for keeping networks and systems as secure as possible during this era of frequent cyberattacks. Each of the five panelists was asked to provide th ...
Follow
24
Was WannaCry the Harbinger of a Black Swan Cyberattack?
Now that we’re almost a month past the WannaCry ransomware attack, it seems like a good time to reflect on it and examine some of the bigger-picture takeaways this attack may be signaling. I want to say upfront this is not meant to be a conspiracy theory or doomsday post. But with that said, WannaCry and some of the other more recent attacks show that the ingenuity and resourcefulness of cybercriminals continue to grow. And as far as ransomware goes, the WannaCry attack is the K ...
Follow
38
The Latest on the WannaCry Ransomware Attack
Three weeks post-attack, and WannaCry is still top-of-mind for infosec professionals worldwide. This was very much in evidence during this week’s SecureWorld Atlanta, which I had the privilege of attending. Multiple sessions — including a panel discussion that featured Wombat Chief Architect Kurt Wescoe — covered ransomware attacks in general, but the conversations all spent a fair amount of time focusing on WannaCry and its impact.
Follow
27
The Latest in Phishing: May 2017
We bring you the latest in phishing statistics and attacks from the wild.
Follow
41
GDPR Compliance Is 1 Year Away. Our Security Awareness Training Can Help You Prepare.
On May 23, we announced the availability of a new security awareness training module that will help global organizations prepare their end users for compliance with a looming standard: the General Data Protection Regulation (GDPR).
Follow
34
Wombat Vlog: Physical Security Is Critical to Identity Theft Protection
In this fourth vlog segment in our series about identity theft protection, we discuss a cybersecurity topic that is sometimes overlooked during this age of email, mobile devices, and cloud computing: physical security.
Follow
53
Three Keys to Avoiding Phishing Emails and Ransomware Attacks
If the past few weeks are any indication, consumers and businesses are under full-scale cyberattack. The early May “Google Docs” phishing attacks reportedly affected approximately one million Gmail users and more than 3,000 organizations. And last week’s WannaCry ransomware attack spread like wildfire to ultimately affect more than 200,000 systems around the globe, including healthcare, transportation, banking, telecom, and government networks. Though the WannaCry ou ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Free Solution For OST to PST
Views: 188 / June 22, 2017
Your Complete Guide to VMware
Views: 182 / June 22, 2017
Collecting Firewall and Router Logs
Views: 156 / June 22, 2017
Your Complete Guide to Wireshark
Views: 3502 / June 21, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel