Other

Phishing

Published on 8 July, 2013 - 08:44 by annieboulanger cybercriminbals, phishing, social engineering, Other
Phishing is a social engineering technique that uses various subterfuges to make victims believe that they are dealing with trustworthy individuals or entities in order to steal personal information, such as passwords, payment card numbers, birth dates, etc. Usually, the perpetrator’s objective is to commit fraud using the stolen personal information (identity theft or fraud, intellectual property theft, etc.).A scammer uses fake emails and websites for phishing or the theft of personal data....

BYOD: The biggest challenge is to meet both the enterprise’s security needs and preferred mobility features

Published on 3 May, 2013 - 14:32 by annieboulanger Bring your own device, BYOD, mobile media, Other
By Philip Veilleux, Information Security AdvisorThe IT world is a succession of dualities and oppositions: PC and Mac, Android and IOS, BlackBerries and personal devices...BlackBerries have ruled the business world for ages as it was THE technological piece geeks wanted as a smart phone. With the market penetration of personal smart phones like the Samsung, iPhone, Nexus and such, employees want to use their own devices in the office. Office rules mandate BlackBerry usage for email, therefore...

Secure information destruction

Published on 10 April, 2013 - 11:26 by annieboulanger good practices, information destruction, information security, information security awareness, security, training, Other
By Patrick Paradis, Information Security AdvisorWhat is the value of the information stored on your computer equipment or paper documents? What would the impacts be if your personal or confidential information fell into the wrong hands (e.g. financial loss, loss of image / reputation, regulatory or legal non-compliance)?Can you be certain that a proper destruction method was used on the information (whether in digital or paper form) to ensure that it is completely destroyed prior to disposal or...

Terranova Training in partnership with Scotiabank Wins Bronze Brandon Hall Learning Technology Award

Published on 26 May, 2011 - 14:10 by annieboulanger Courses, Marketing and Communications, Other
Montreal, May  2011 - Terranova Training, a leader in innovative learning, has won a coveted Brandon Hall bronze award for technology excellence in the Best Advance in Learning Management Technology for Compliance Training category. The course Information Security and Privacy – It’s Everybody’s Business, was submitted by both, Terranova Training and its client, Scotiabank. The course was launched on July 19, 2010, in two languages, English and French, to almost 40,000 Scotiabank employees in...

Great Resources - Take 2

Published on 21 June, 2010 - 23:37 by Terranova elearning templates, free resources, resources, tips, tools, Planning, Other
Below is the promised Part 2 of the list of free resources.  If you need to “freshen” up your existing training or are looking for potentially new ideas for security awareness, some of these links may be helpful.  If you have any more you would like to share, we would love to hear about them. http://csrc.nist.gov/publications/nistpubs/800-16/800-16.pdf - NIST - Information Security Requirements http://www.iwar.org.uk/comsec/resources/sa-tools/ - Information Warfare Site Resources http://www....

Learning Resources Worth Looking At

Published on 17 May, 2010 - 20:55 by Terranova Add new tag, corporate training, e-Learning, resources, News, Other
I always love seeing blog entries that contain great resource references.  So, I thought I would start one!  Here is the start of a list that I decided to start compiling of some really good blogs that contain a ton of resources, tips, tricks and more links.  Feel like sharing yours and growing the list? Around the Corner-MGuhlin.org Box of Tricks Creative Teaching Corporate eLearning Strategies and Development Custom Training and eLearning Blog Educational Origami Experiencing E-Learning Jane...

Security Awareness Program Updates – Managing Program Changes

Published on 22 March, 2010 - 10:35 by Terranova e-Learning, managing change, security awareness training, training plan, updates, Planning, Other
Consistent updates will assist you in managing change throughout the yearly life cycle of your security awareness program. It is imperative that you update your program to ensure that training/ awareness/education deployments do not become stagnant and therefore irrelevant to real emerging issues faced by the organization. A planned and consistent update program will also allow you to address changes in security policy, directives and procedures driven from new threats, technologies or...

The Year's Most Hacked Software

Published on 21 December, 2009 - 00:56 by Terranova Add new tag, awareness, IT Risks, viruses, News, Other
http://www.forbes.com/2009/12/10/adobe-hackers-microsoft-technology-cio-... Forbes recently compiled a list of the seven Most-Hacked software titles for 2009.  They took a survey of security professionals from various companies including Verisign, TippingPoint, iDefense and Qualys.  Based on this survey, Forbes found that the following were the most hacked software titles from 2009. Adobe Reader Internet Explorer Mozilla Firefox Adobe Flash Apple Quicktime Microsoft Office Microsoft...

Can we look at a new paradigm for teaching security awareness?

Published on 4 December, 2009 - 01:17 by Terranova online education, online training, social media, teaching paradigm, Planning, Other
At schools and colleges across the country and around the world, the use of the Internet and Web for learning and teaching is causing a major change in the landscape of education. Building upon decades of computer networking activities (e.g. e-mail and bulletin board systems), the Internet has produced phenomenal growth in the extent and scope of online education. Online education has created a new paradigm for teaching and learning different from the traditional classroom experience, and also...