Loading...

Our 2018 Beyond the Phish® Report provides an in-depth look at end-user cybersecurity knowledge across 12 topics areas and 16 industry segments. Wombat's Amy Baker and Kurt Wescoe recently participated in a SecureWorld Behind the Scenes interview about this unique report. Listen in on the recording below to learn these (and other) valuable insights:

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

 The Human Factor 2018 by Proofpoint, our parent company, is a report that cuts to the chase in its subtitle, “People-Centered Threats Define the Landscape.” A virtual treasure trove of information, the data revealed in the report make one thing crystal clear: end users are increasingly targeted within organizations, and cybercriminals are using human exploits to their advantage.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Physical security risks can have a significant impact on your organization’s ability to safeguard confidential information, secure locations, and even employees themselves. According to Verizon’s 2018 Data Breach Investigations Report (DBIR), 11% of confirmed data breaches during 2017 involved physical actions. This includes physical theft and loss, with paper documents and laptops the assets most likely to go missing.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

This week, we released the 2018 edition of our Beyond the Phish® Report, an annual publication that analyzes data gathered from knowledge assessments and training challenges presented to our customers’ end users via our Security Education Platform. This year’s report analyzes nearly 85 million questions and answers related to 12 cybersecurity topics, and compares results across 16 industries.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Verizon recently released the 2018 Data Breach Investigations Report (DBIR), its annual analysis of the real-world security events that are impacting organizations around the globe. The report collected data from 67 contributing organizations, covering over 53,000 incidents and 2,216 confirmed data breaches.*

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

We bring you the latest in phishing statistics and attacks from the wild.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Last year, we added Awareness Video Campaigns to our selection of security awareness training tools in direct response to an interactive discussion with attendees at our 2016 Wombat Wisdom Security Awareness and Training Conference. Today, we are excited to announce the addition of a third series of videos — and companion posters and imagery — to our Security Awareness Materials portfolio that will help our customers continue to develop and execute engaging and effective cybersecurity education programs.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Mobile devices court risk on many levels, from malware to network compromise to outright theft. While many of these risks can be mitigated with technical solutions, one threat is extremely difficult (if not impossible) to control: the users themselves.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

In our latest vlog segment, we explain why our trendsetting Continuous Training Methodology — which combines assessments, education, reinforcement, and measurement — helps organizations deliver more effective security awareness training. Watch now to learn why regular, ongoing cybersecurity education is critical to the reduction of end-user risk.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

As you might already know from our Wombat Advantage program, we are very customer focused; we actively seek opportunities to engage with — and learn from — our customers, and we also actively ask for feedback from the program administrators who use our security awareness training products.

Read Full Article
Visit website

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview