Wombat Security
Follow
104 Followers
Follow Wombat Security on their other social channels!
About Us
Founded:
2008
Company Size:
51-200 employees
Company Type:
Private
Location:
Pittsburgh, PA; USA
Website:
At Wombat Security, our mission is to deliver software-based cyber security awareness and training solutions that help your employees understand the risks associated with poor cyber hygiene and subsequently change their behaviors to strengthen your organization’s security posture. Our Continuous T ...
Read more
Promoted Content
2017 Beyond the Phish Report
Follow
Social Media Influences Decision-Making of Employers, Colleges
There are many lighthearted, convenient, and fun aspects about sharing content on social media platforms, and as the relatively new (and often coveted) moniker of “Social Influencer” suggests, the thoughts, images, and information we share on social channels can significantly impact others. Unfortunately, in the case of college admissions officers and prospective (or even current) employers, that effect isn’t always positive.
Follow
Conference Preview: Wombat Wisdom 2018
This year’s Wombat Wisdom Conference is just around the corner, and we’d like to share some new event details with you. For the fourth year, we’re bringing together some of the brightest minds in security to share ideas and actionable concepts around the continuous improvement of security awareness and training programs — and adding some new twists.
Follow
New ‘Password Protection’ Security Awareness Training Series
Passwords and account authentication continue to be important defenses for systems and data, and good password hygiene among end users is critical for end-to-end security. In February, we announced our configurable Password Policy security awareness training module, which allows organizations to educate employees based on company-specific policies — an industry first. Now, we have added three new modules to our password training portfolio and incorporated more configuration opti ...
Follow
Compliance, Phishing Are Top Time Drains for Security Teams
This year’s Black Hat Attendee Survey report, Where Cybersecurity Stands, is billed as a “look at the concerns, attitudes, and plans of some of the industry’s top IT security professionals.” Black Hat surveyed 315 current and former conference attendees, gathering responses from CEOs, CISOs, CIOs, CTOs, and other infosec professionals across more than 20 industries. We highlight some key findings below — and invite you to stop by and see us at Booth #258 ...
Follow
$12.5 Billion Lost in BEC Attacks, FBI Reports
Business email compromise (BEC) attacks are cybersecurity threats that all business leaders — not just those with “Security” in their titles — should be taking note of for three simple reasons: They directly target individuals with means and access. They often skirt technical defenses. A single successful attack can deliver a crippling financial blow.
Follow
‘Email Fraud Threat Report’ Shows Pressing Danger of BEC Attacks
In its Email Fraud Threat Report: Year in Review 2017, Proofpoint (our parent company) highlights the rise of business email compromise (BEC) attacks during the course of 2017. The report draws from analysis of more than 160 billion emails sent to more than 2,400 organizations across 150 countries. Following are some of the key findings related to these specialized phishing attack patterns:
Follow
16
Hands-On Security Awareness Training Workshop Kicks Off Wombat Wisdom 2018
Join us September 18-20 in our hometown of Pittsburgh, PA, for the fourth annual Wombat Wisdom Conference. This event brings together some of the brightest minds in security to share ideas and actionable concepts around the continuous improvement of security awareness training programs — and this year’s gathering is shaping up to be bigger and better than ever.
Follow
25
IoT Statistics: What’s in Store for Devices, B2B Apps & IoT Security?
From personal fitness trackers to commercial drones, from smart appliances to smart cities, it’s clear that the Internet of Things (IoT) has mass appeal and virtually unlimited potential for growth. Though there’s been a lot of focus on the consumer side of IoT, it’s B2B applications that have this market poised to explode. As Verizon noted in its State of the Market: Internet of Things 2017:
Follow
25
PhishAlarm Product Update: Extended Support for Mobile Email Reporting
With the proliferation of smart devices and BYOD work environments, organizations have increasingly mobile workforces. Recent research indicates that more than half of all emails are opened on mobile devices — which means that end users are definitely encountering phishing messages on their smartphones and tablets. We recognize the need to allow users to report suspicious emails from all the devices they use, and the latest update to our PhishAlarm® email reporting button ex ...
Follow
28
Phishing ‘Decision Tree’: Help End Users Identify Suspicious Emails
Ongoing awareness and education about phishing is critical to changing end-user behaviors for the long haul. Our new infographic will help you keep email best practices top-of-mind for your employees by reinforcing key anti-phishing principles taught within our phishing training modules. 

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel