Wombat Security
Follow
102 Followers
Follow Wombat Security on their other social channels!
About Us
Founded:
2008
Company Size:
51-200 employees
Company Type:
Private
Location:
Pittsburgh, PA; USA
Website:
At Wombat Security, our mission is to deliver software-based cyber security awareness and training solutions that help your employees understand the risks associated with poor cyber hygiene and subsequently change their behaviors to strengthen your organization’s security posture. Our Continuous T ...
Read more
Promoted Content
2017 Beyond the Phish Report
Follow
1
Security Awareness Training: One CISO’s Journey From Doubter to Believer
As a former Fortune 500 CISO (and current Security Advisor to Wombat), Alan Levine has an extensive and impressive resume. He has global experience in infosec strategy and management; data privacy, IT compliance, and corporate regulatory compliance; and all aspects of cybersecurity within large, multinational organizations. He is also an experienced lecturer and educator; a founding member of the Microsoft Security Council and Oracle’s GRC Council; and current board chair and fo ...
Follow
9
What Can Vintage NSA Security Awareness Posters Tell Us?
From its earliest days, the US National Security Agency (NSA) has used inventive security awareness materials to keep security top-of-mind among employees, as evidenced in the NSA’s recent release of more than 100 posters from the 1950s to the 1970s. While many of the posters reflect the secrecy (even paranoia) of the Cold War era, they also offer interesting takeaways for today’s security awareness and infosec professionals.
Follow
12
Unfollow: Pretexting and Phishing on Social Media
Email phishing attacks may get the lion’s share of attention from infosec professionals, but cybercriminals are also happy to use social media to go after unsuspecting employees. These attacks can result in several negative outcomes, according to Proofpoint’s The Human Factor 2018 Report: credential loss due to phishing, malware infections — even coin mining through browser hijacking.
Follow
10
New APWG Phishing Statistics Hint at a Focus on Targeted Attacks
The Anti-Phishing Working Group (APWG) recently released its Phishing Activity Trends Report for Q4 2017, which compiles and analyzes data related to reported phishing campaigns (i.e., unique emails sent to multiple users with the same subject line in a given month) and unique phishing websites. Following are key takeaways from the report:
Follow
10
GDPR Training Modules: Educate Your Users About Data Privacy
The General Data Protection Regulation (GDPR) is primed to reshape data privacy on a global scale, and organizations that process and/or hold the personal data of EU residents will be required to properly and securely manage that data — or face hefty fines. Given that employees at all levels within these organizations have access to personal data, it’s critical that end users be immediately factored into the compliance equation.
Follow
19
Cybersecurity Heroes Aren’t Born … They’re Made
As organizations have become more open to the idea of delivering security awareness training to employees, phishing has become a primary focus — and with good reason. There's no arguing  the prevalence of the threat or the damage it causes. Still, email is just one of many mediums at cybercriminals' disposal. As well, not all data breaches and security incidents happen as a result of an attack; plain old human error and a lack of knowledge of cybersecurity best pr ...
Follow
13
Go Behind the Scenes of Our 2018 Beyond the Phish Report
Our 2018 Beyond the Phish® Report provides an in-depth look at end-user cybersecurity knowledge across 12 topics areas and 16 industry segments. Wombat's Amy Baker and Kurt Wescoe recently participated in a SecureWorld Behind the Scenes interview about this unique report. Listen in on the recording below to learn these (and other) valuable insights:
Follow
19
‘Human Factor’ Report Is a Rally Cry for People-Centered Security
 The Human Factor 2018 by Proofpoint, our parent company, is a report that cuts to the chase in its subtitle, “People-Centered Threats Define the Landscape.” A virtual treasure trove of information, the data revealed in the report make one thing crystal clear: end users are increasingly targeted within organizations, and cybercriminals are using human exploits to their advantage.
Follow
24
Cybersecurity Travel Tips: Proactively Protect Data and Devices
According to recent research by Dashlane, a password management company, many of the world’s top travel companies have less-than-stellar (and, in some cases, downright dismal) password requirements for end-user accounts. With that news in mind, it’s time for vacationers and business travelers alike to be more proactive about their cybersecurity habits, from the time of booking until the point they return home.
Follow
37
Physical Security: Are Your End Users an Asset or a Liability?
Physical security risks can have a significant impact on your organization’s ability to safeguard confidential information, secure locations, and even employees themselves. According to Verizon’s 2018 Data Breach Investigations Report (DBIR), 11% of confirmed data breaches during 2017 involved physical actions. This includes physical theft and loss, with paper documents and laptops the assets most likely to go missing.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel