Wombat Security
Follow
96 Followers
Follow Wombat Security on their other social channels!
About Us
Founded:
2008
Company Size:
51-200 employees
Company Type:
Private
Location:
Pittsburgh, PA; USA
Website:
At Wombat Security, our mission is to deliver software-based cyber security awareness and training solutions that help your employees understand the risks associated with poor cyber hygiene and subsequently change their behaviors to strengthen your organization’s security posture. Our Continuous T ...
Read more
Promoted Content
2017 Beyond the Phish Report
Follow
7
2018 State of the Phish: Phishing Data, Insights, and Advice
We’re excited to announce the release of our 2018 State of the Phish™ Report, an annual research study that is a trusted resource for infosec professionals who are planning and delivering security awareness training programs for their end users. This year’s report combines data and analysis from three key sources:
Follow
9
Security Awareness Training: Best Practices to Consider
When it comes to security awareness training, each organization's program is likely to be at least slightly unique. In fact, we encourage organizations to put their own stamp on their cybersecurity education intiatives in order to reflect specific policies and elements of corporate culture. That said, we have identified several elements that are common threads among the most effective programs. These are the key components to consider as you plan your initiatives:
Follow
13
Check out Our New Security Awareness Training Website
We’re guessing you’ve noticed the fresh look and feel of the Wombat Blog, and we hope you like this new design. It’s part of a recent update to the entire Wombat Security website. We’ve incorporated additional resources and tools that will help you more effectively and efficiently plan your security awareness training program.
Follow
9
Worst Passwords of 2017: Deja Vu All Over Again
Another year in the books ... another batch of bad passwords to peruse. We reviewed SplashData’s 2016 and 2015 editions of its “Worst Passwords List” in prior years. When it comes to 2017's rankings, it's possible Yogi Berra's quote, "It's deja vu all over again," has never been more apt. 
Follow
10
Cybersecurity Wins: January 2018
It seems like another new phishing attack or ransomware strain is always waiting just around the corner. But it’s good to recognize the successes happening in the battle against cyber theft, cyber espionage, and social engineering, and that many of the criminals involved are being brought to justice. Here are some highlights of cybersecurity wins from the last few months of 2017.
Follow
16
Revisit Some of Our Top Security Awareness Training Posts From 2017
As the year winds to a close, we thought you might be interested in taking a look back at seven of our most popular blog posts from 2017:
Follow
29
Cybersecurity Resolutions: Make 2018 the Year of the End User
As we close out 2017, it's a good time to think ahead to next year and the processes and procedures that could be improved in 2018 to better manage end-user risk and improve overall security postures. In this vlog entry, we suggest reexamining the way pieces of technology are used throughout your organization and considering whether users of all kinds — including you — are thinking about devices in the right ways and obtaining the appropriate levels of training ...
Follow
22
The Latest in Phishing: December 2017
We bring you the latest in phishing statistics and attacks from the wild.
Follow
32
Five Cybersecurity Predictions for 2018
As we look ahead to 2018, some are predicting new and novel cyberthreats, such as ransomware attacking people through Internet of Things- (IoT-) enabled home appliances. While such dystopian visions may indeed come to pass, what’s clear to us is that end-user risk will continue to play a critical role in an organization’s cybersecurity.
Follow
23
All-In on Technology? Expect Users to Fold When the Chips Are Down.
Despite the fact that many security experts have been encouraging — even imploring — organizations to think differently about their end users and focus on building a culture of security from the top down, infosec professionals still yearn for a technical solution to employee-driven cybersecurity woes, phishing in particular. This is, frankly, totally understandable. As humans, we all long for “magic bullet” solutions to pressing and wide-ranging problems, and o ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Why Do You Need a VPN?
Views: 771 / January 21, 2018
How to Evade AV with OWASP-ZSC – Part 1
Views: 1067 / January 20, 2018
Tracking IP info with its Metadata
Views: 1874 / January 19, 2018
UNMASKED: Skygofree, FISA, and Google
Views: 1512 / January 19, 2018
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel