Wombat Security
Follow Wombat Security on their other social channels!
About Us
Company Size:
51-200 employees
Company Type:
Pittsburgh, PA; USA
At Wombat Security, our mission is to deliver software-based cyber security awareness and training solutions that help your employees understand the risks associated with poor cyber hygiene and subsequently change their behaviors to strengthen your organization’s security posture. Our Continuous T ...
Read more
Promoted Content
2017 Beyond the Phish Report
Cybersecurity Wins: December 2018
Cybersecurity news can be grim — a seemingly endless litany of new phishing campaigns, social engineering attacks, and massive data breaches. (Did we mention the massive data breaches?) And let’s not even get started on the ongoing investigations into possible election meddling and the hacking of voter databases and political groups.
Attack Spotlight: Defend Against Emotet Trojan Phishing Campaign
Recently, Proofpoint researchers have seen a rising number of phishing emails with attachments or links that contain a new, particularly dangerous version of the Emotet trojan. Emails with Emotet have been distributed on a near-daily basis and in high volume, with as many as 1 million messages sent in a single day. Our latest Attack Spotlight, available now, provides free, timely content you can immediately share with your end users to help them ...
Shopping on Your Smartphone? 3 Mobile Device Security Tips
It’s no secret that mobile devices have become a ubiquitous part of our culture, but you may be surprised to learn how frequently technology users are turning to smartphones for online shopping. According to fresh findings from Adobe Digital Insights (ADI), mobile spending was up 44% year-over-year among US consumers from Thanksgiving through Cyber Monday.
From PINs to Prints: Smartphone Locks and Mobile Device Security
When securing your home’s front door, you have several choices: knob/lever locks, deadbolts, keypads, and smart locks with Internet of Things (IoT) features. Each offers varying degrees of convenience, along with vulnerabilities criminals can exploit to get at what’s inside. You have similar choices to make when it comes to how you lock the “front door” of your smartphone.
Veolia DPO Finds Success With Wombat Security Awareness Training
As a global leader in optimized resource management, Veolia group — and its more than 160,000 employees — designs and provides water, waste, and energy management solutions that serve millions of people worldwide. Compliance has always been a top pursuit for the organization, but as information security and compliance have increasingly intertwined, educating end users has become more challenging — something that Veolia’s John Hield knows all too well.
We’ve Been Named a Gartner MQ Leader for the Fifth Consecutive Year
Leading IT research and advisory firm Gartner, Inc. has released its 2018 Magic Quadrant for Security Awareness Computer-Based Training (CBT), and we’re excited and honored to share that we have been recognized as a Leader for the fifth year in a row.* Our strong position this year reflects our Completeness of Vision and Ability to Execute — and we ranked highest in the latter metric.
5 Security Tips for Smart TVs
As smart TVs become increasingly prevalent, users need to be aware of the security and privacy challenges they present. Even those who employ good security habits with their smartphones, laptops, and tablets may not exercise the same caution when it comes to the entertainment device in the heart of their home.
Go Behind the Scenes of Our ‘User Risk Report’
We recently released our 2018 User Risk Report, which features results from a global survey of more than 6,000 working adults across six countries (the US, UK, France, Germany, Italy, and Australia). The report explores technology users’ personal cybersecurity behaviors and their general knowledge of best practices related to email security, use of WiFi and virtual private networks (VPNs), password management, use of corporate-issued devices for private tasks, and more.
Employees Take Risks When Using Corporate Devices for Personal Tasks
The lines continue to blur between personal and business use of technology, and the rise of BYOD probably bears much of the blame. This has occurred despite the fact that many organizations do define those lines in “acceptable use” policies that govern use of corporate IT assets, including on-premises internet access and employer-issued laptops, tablets, and smartphones.
2018 US Data Breach Statistics: Plenty of Ghosts in the Graveyard
The latest Data Breach Report by the Identity Theft Resource Center (ITRC) offers a year-to-date tally of confirmed data breach notifications affecting US organizations and their customers in 2018.* The totals as of October 3 — 932 breaches and more than 47.2 million records exposed — are well behind the record-breaking numbers of October 2017, which saw more than 171 million records exposed by month’s end. However, the current numbers rival 2016 year-end totals (1,0 ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?