Wombat in the News
Wombat’s staff contributes articles for industry publications and provides expert commentary for news media, including Wired, TechRepublic, and Fast Company, as well as The Economist and The Wall Street Journal.
Wombat’s staff contributes articles for industry publications and provides expert commentary for news media, including Wired, TechRepublic, and Fast Company, as well as The Economist and The Wall Street Journal.
Wombat’s staff contributes articles for industry publications and provides expert commentary for news media, including Wired, TechRepublic, and Fast Company, as well as The Economist and The Wall Street Journal.
March 30, 2018
As seen on TechTarget... It took a nation-state attack for Alan Levine to realize the importance of implementing a cyber awareness program. “I believed that cyber...
Read MoreMarch 26, 2018
As seen on Information Security Buzz... As more and more Americans continue to turn to technology to file their taxes, there is — as with virtually all of today’s...
Read MoreMarch 26, 2018
As seen on Professional Security... Board members are recognised as a trusted group of individuals with the expertise and experience to oversee the overall activities...
Read MoreMarch 22, 2018
As seen on Next Pittsburgh... If you’re an entrepreneur trying to launch a business in Pittsburgh, it might be getting easier, according to data released this week by...
Read MoreMarch 22, 2018
As seen on Security Info Watch... In the United States, there may be no surer sign of spring than March Madness — at least for fans of NCAA Men’s Basketball. Like other...
Read MoreMarch 20, 2018
As seen on TribLIVE... Pittsburgh's technology sector has boomed for the past decade, increasing the number of companies and the amount invested nearly every year. Last...
Read MoreMarch 19, 2018
As seen on Enterprise Management 360... The practice of bringing your own computers or devices to work is quite well-established now. Most companies now have at least...
Read MoreMarch 18, 2018
As seen on CAP Today... We all know we shouldn’t click on suspicious emails, but suppose you see an email from your department of human resources with an attached...
Read MoreMarch 7, 2018
As seen in Carnegie Mellon’s Institute for Software Research News… Strip District firm is industry leader in training employees to prevent cyber attacks Proofpoint Inc.,...
Read MoreMarch 5, 2018
As seen on Enterprise Management 360... Ransomware first emerged in 2012, but has been around in one form or another for quite some time since way back when. Ransomware...
Read MoreMarch 1, 2018
Pittsburgh Business Times subscribers can read this article at: ...
Read MoreMarch 1, 2018
As seen in Risk Management Magazine... According to Wombat Security’s annual State of the Phish report, 76% of organizations experienced a phishing attack in 2017. ...
Read MoreFebruary 26, 2018
As seen on Credit Union Times... Two recent cybersecurity solutions, an artificial intelligence-based biometric security measure from Nuance; and a password policy...
Read MoreFebruary 23, 2018
As seen on Help Net Security... Training employees to spot phishing emails, messages and phone calls can’t be done just once or once a year if the organization wants to...
Read MoreFebruary 22, 2018
As seen on IT Pro Portal... Employee training is key to preventing your organisation from falling victim to ransomware and other cyber threats. Bad Rabbit was the third...
Read MoreFebruary 20, 2018
As seen on Security Brief... Proofpoint will hand over US$225 million (AU$284 million) as part of a deal that will help the company continue its journey into the...
Read MoreFebruary 14, 2018
As seen on the Daily Mirror... Imagine you occasionally used your computer for more… adult enertainment. You wouldn’t be alone; a few years ago the University of...
Read MoreFebruary 13, 2018
As seen on Computer Weekly... Reviews of organisational security can be viewed in many positive ways, but all too often with trepidation or resignation. The rise of...
Read MoreFebruary 8, 2018
Pittsburgh Business Times subscribers can read this article at https://www.bizjournals.com/pittsburgh/news/2018/02/08/what-wombat-will-look-like-post-acquisition.html
Read MoreFebruary 8, 2018
As seen on TribLive... A Pittsburgh cybersecurity firm will stay local and grow after it was purchased for $225 million. Proofpoint, a Silicon Valley cybersecurity...
Read MoreFebruary 7, 2018
As seen on CyberScoop.. Proofpoint has announced it has entered into an agreement to purchase Pittsburgh-based Wombat Security Technologies for $225 million in cash. By...
Read MoreFebruary 7, 2018
As seen on Barron's... Enterprise security company Proofpoint (ticker: PFPT) picked up its largest acquisition -- and another winning financial quarter -- on Tuesday. On...
Read MoreFebruary 7, 2018
As seen in the Pittsburgh Post Gazette... Sunnyvale, Calif.-based cybersecurity firm Proofpoint will acquire Strip District-based Wombat Security Technologies Inc. for...
Read MoreFebruary 6, 2018
As seen on Investor's Business Daily Technology... Cyber-security provider Proofpoint (PFPT) late Tuesday reported adjusted fourth-quarter earnings that topped views...
Read MoreFebruary 6, 2018
As seen on UK Reuters... Proofpoint Inc - expects Wombat to increase 2018 revenue range by $30 million - $32 million Proofpoint Inc - expects Wombat to increase 2018...
Read MoreFebruary 6, 2018
As seen on Security Week... Cybersecurity firm Proofpoint on Tuesday announced that it has agreed to acquire Wombat Security Technologies for $255 million in cash. ...
Read MoreFebruary 6, 2018
As seen on Market Watch... Proofpoint Inc. PFPT, +1.59% said late Tuesday it had agreed buy Wombat Security Technologies Inc. for $225 million in cash. The deal is...
Read MoreFebruary 6, 2018
As seen on Pittsburgh Business Times... A Pittsburgh-based security awareness and training software company was acquired for $225 million by a Silicon Valley...
Read MoreFebruary 6, 2018
As seen on CRN... Proofpoint said it plans to provide the industry's first-ever integration of market-leading protection and awareness offerings through its $225 million...
Read MoreFebruary 2, 2018
As seen in the Pittsburgh Business Times... A Pittsburgh-based security awareness and training software company is aiming to make reporting phishing emails a little...
Read MoreJanuary 31, 2018
As seen on BTC... Computing Security asked those in the know to do some future-gazing and give us their top predictions for cybersecurity in 2018. Here's what they had...
Read MoreJanuary 30, 2018
As seen on MediaPost... In a world of daily hack attacks and data breaches, it's hard to imagine any good news about spear phishing. But there is some: the number of...
Read MoreJanuary 29, 2018
As seen on THE Journal... In a recent study, 10 percent of simulated phishing e-mails sent to users in education institutions were successful, causing the recipient to...
Read MoreJanuary 28, 2018
As seen on Information Management... Data Privacy Day is held annually on January 28 by the National Cyber Security Alliance in an effort to create awareness about the...
Read MoreJanuary 26, 2018
As seen on TechRepublic... Wombat's state of phishing report shows that attack rates remain steady, but there is some good news: User Click rates have dropped. The...
Read MoreJanuary 24, 2018
As seen on Beta News... In its recent State of the Channel Ransomware Report, data protection firm Datto found that SMBs ponied up some $301 million to digital hostage...
Read MoreJanuary 24, 2018
As seen on Trip Wire... Phishing attacks continue to threaten organizations’ digital security in droves. Kaspersky Lab prevented 46,557,343 phishing attempts in the...
Read MoreJanuary 19, 2018
As seen on Security Intelligence... Corporate awareness of phishing attacks is on the rise, but that hasn’t stopped attackers from doubling down on efforts to infect...
Read MoreJanuary 19, 2018
As seen on IT Security Guru... Wombat Security Technologies (Wombat), the leading provider of cyber security awareness and training, today announces the release of its...
Read MoreJanuary 18, 2018
As seen on IT Pro Portal... Report claims that malware infections and compromised accounts rose more than 80 per cent in 2017. Three quarters of organisations (76 per...
Read MoreJanuary 17, 2018
As seen in InfoSecurity Magazine... The war against phishing is still on, with 76% of organizations experiencing phishing attacks in 2017. Further, nearly half of...
Read MoreJanuary 17, 2018
As seen in the Pittsburgh Business Times... Phishing attacks remained steady or higher in 2017 compared to 2016, according to Wombat Security Technologies' fourth...
Read MoreJanuary 17, 2018
As seen in Dashlane blog... Phishing attacks are on the rise, and they’re more sophisticated than ever. The reason these types of attacks are on the rise is because...
Read MoreJanuary 8, 2018
Pittsburgh, recently named as one of four U.S. tech hubs to watch in 2018 by VentureBeat, has a vast array of tech companies, from startups to mature companies, poised...
Read MoreJanuary 6, 2018
t’s the middle of January and life on these islands is pretty miserable just now. So it’s little wonder that sun-starved Brits are trying to give themselves something to...
Read MoreJanuary 5, 2018
As Tui, the UK’s market leader in travel, predicted the busiest booking day of the year on ‘Sunshine Saturday’ tomorrow firms were alerted to a darker side to the sales...
Read More
December 22, 2017
Happy New Year! SC Media UK resumes news reporting on 2 Jan 2018. During the break, catch up on our experts' predictions for a range of positive and negative futures,...
Read MoreDecember 20, 2017
Here at IT Security Thing we end up travelling all over the world to listen to what the great and the good of the cybersecurity industry have to say. It’s a tough job,...
Read MoreDecember 20, 2017
Wombat Security Technologies has given its 2018 security predictions. Phishing is predicted to continue serving as a key access point for increasing cyber attacks on...
Read MoreDecember 19, 2017
As part of the recently published research report from ESG and the information systems security association (ISSA) titled, The Life and Times of Cybersecurity...
Read MoreDecember 17, 2017
Think of social engineering, in the context of information security, and you probably conjure up an image of Nigerian scammers promising millions in return for bank...
Read MoreDecember 15, 2017
A recent study by Wombat Security Technologies reveals some startlingly alarming insights about workers’ awareness of cyber threats. The study indicated that there are...
Read MoreDecember 14, 2017
2017 was saturated with cyber-attacks from Petya to KRACK, and this trend has no end in sight. 2018 will likely include further cyber-attacks at an increased rate with a...
Read MoreDecember 9, 2017
Contactless cards are the impatient shopper’s best friend and now account for a fifth of all purchases in shops by plastic. But beware when hitting the high street...
Read MoreDecember 4, 2017
What is the format? Each year we ask security professionals to tell us what they think the single biggest security threat of the following year will be along with a one...
Read MoreNovember 21, 2017
From an operations perspective, the employees in your organisation are on the front lines of your business. But from a security perspective, end users are your last...
Read MoreNovember 15, 2017
Wombat Security Technologies develops technology delivered as a service that is designed to raise employee awareness of security threats. Highlights Wombat has an...
Read MoreNovember 13, 2017
Last year’s Cyber Monday was the biggest online sales day in history, with a whopping $3.45 billion (£2.62 billion) being spent. Cyber Monday has traditionally been a...
Read MoreNovember 11, 2017
No one is safe from the threat of cyber-crime, but attacks against the financial services industry are becoming increasingly sophisticated and frequent, arguably more...
Read MoreNovember 10, 2017
Read the article in Computer Fraud and Security
Read MoreNovember 9, 2017
Read the article in RiskUK
Read MoreOctober 30, 2017
Members of the board sit in a highly privileged position, and have access to some of the most sensitive corporate information around. However, statistics show that as...
Read MoreOctober 27, 2017
One of the latest high profile phishing attacks affecting the UK has seen a new social engineering scam impersonating HM’s Revenue & Customs (HMRC) to trick victims...
Read MoreOctober 19, 2017
A User Risk Report released by Wombat Security earlier this year revealed that many workers are not only unfamiliar with security threats and how to combat them, but...
Read MoreOctober 17, 2017
All computer users, especially experts, should be trained and capable of recognising even targeted attacks like spear phishing. Spear-phishing, or targeted phishing...
Read MoreOctober 16, 2017
Statistics about how prepared organisations are for the GDPR seem to be rarely, if ever, positive. For example, recent research from Veritas has found that around half...
Read MoreOctober 13, 2017
Royal Bank of Scotland brought down click rates on simulated phishing emails from 47% in August 2016 to 22% in October 2016 Cyber-crime is growing exponentially. At the...
Read MoreOctober 10, 2017
Phishing attacks have escalated sharply in recent years. What was once a nuisance has become a mainstream—and increasingly dangerous—problem. In addition to an increase...
Read MoreOctober 4, 2017
Understanding best practices around shared login credentials is still a struggle for most employees. A new report has found that the number one cyber-security related...
Read MoreOctober 3, 2017
Cyber Warfare Can be Exerted by Any Nation With an Actual or Perceived Grievance Against Any Other Nation The effect of geopolitics on cybersecurity can be seen daily –...
Read MoreOctober 2, 2017
October is National Cyber Security Awareness Month (NCSAM). Over the next four weeks, we will do our part to promote awareness of safe online practices by sharing with...
Read More
September 29, 2017
A large number of working adults still do not know what phishing and ransomware are, let alone how to detect a social engineering attack, according to Wombat Security’s...
Read MoreSeptember 21, 2017
A study by Wombat Security Technologies of more than 70 million questions and answers identifies strengths and weaknesses tied both directly to phishing and threats...
Read MoreSeptember 19, 2017
Users today are more likely to recognize a phishing attack than they were a year ago, according to data from Wombat Security Technologies. In the 2017 Beyond the Phish...
Read MoreSeptember 19, 2017
Hackerpocalypse. That is the term used by Cybersecurity Ventures to describe the onslaught of cyber-crime that cost $3 trillion globally in 2015 and is projected to...
Read MoreSeptember 19, 2017
Industries across the board have seen an improvement in 2017 in terms of identifying phishing attacks: On average, only about 24% of respondents in an analysis on...
Read MoreSeptember 15, 2017
The cost of security education for large enterprises at an all-time-high, coming in at $290,033 per year—a clear indication that user education is rocketing up CIOs’...
Read MoreSeptember 12, 2017
VPNs have now become a widely adopted technology, and a recent report revealed that 2 in every 3 American employees in the tech sector turn to VPN for an extra layer of...
Read MoreSeptember 12, 2017
DMARC Can Be Effective in Defending Against Targeted Phishing Attacks And Student Loan Scams As the new academic year starts, so starts the "Fresher" phishing scam....
Read MoreSeptember 8, 2017
A recent survey by Wombat Security, 2017 User Risk Report, has shown that VPNs are becoming mainstream – but American respondents surveyed turned out to be much bigger...
Read MoreSeptember 8, 2017
VPN use is increasingly becoming the norm with almost two-thirds of American working adults making use of one as well as almost half of those from the UK. That’s...
Read MoreSeptember 8, 2017
Popular email platforms like Gmail are prime phishing targets. Admins can adopt these steps to keep attackers at bay. Phishing is not a new threat to the enterprise,...
Read MoreSeptember 7, 2017
Some surprising takeaways emerged from a recent survey. VPNs have now become mainstream at least in the US according to a new survey that compared VPN usage in both the...
Read MoreSeptember 5, 2017
This week, MacEwan University in Canada lost $9.5million due to a spear phishing attack. A write up by the BBC explained that, “fraudulent emails convinced staff at...
Read MoreSeptember 5, 2017
Dive Brief: The majority of U.S. working adults have a VPN installed and frequently use it while at home and when traveling, according to a recent report from Wombat...
Read MoreSeptember 5, 2017
Virtual private networks (VPNs) are becoming mainstream, with 65% of 1,000 American respondents in a recent survey saying that they used one on a corporate and/or...
Read MoreSeptember 4, 2017
An international cybersecurity awareness survey found that 65% of U.S. tech sector workers now use a virtual private network (VPN) on either work devices, personal ones...
Read MoreAugust 29, 2017
An adware campaign working, via Facebook messenger, is using targeted notes and URLs to trick Facebook users into clicking through to an installation screen for adware.
Read MoreAugust 21, 2017
News of major mobile security breaches is becoming a regular occurrence. As cybersecurity threats grow more sophisticated, they’re launching aggressive attacks that...
Read MoreAugust 15, 2017
I’m not a big fan of the “you can’t fix stupid” mindset that is a popular fallback for IT professionals who are running unsuccessful employee security-awareness...
Read MoreAugust 9, 2017
While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious what is the...
Read MoreAugust 9, 2017
People are the last line of defence in your organisation's security infrastructure, yet half the population are ignorant of ransomware, and many don't understand...
Read MoreAugust 1, 2017
From CryptoLocker to WannaCry and NotPetya, these attacks illustrate the growth of ransomware. While the last few years have seen a remarkable uptick in this...
Read MoreJuly 31, 2017
In January, we took a look at some of the cyber security trends we thought would dominate the upcoming year. And guess what? They’re happening. Attacks within the...
Read MoreJuly 20, 2017
Is the issue of social media safety being exacerbated over the summer holidays, as employees take their phones on holiday? The summer holiday season is upon us, and...
Read MoreJuly 17, 2017
I’ve written a lot over the years about the ways employees contribute to an organization’s cybersecurity failings. We’ve seen insider threats, both malicious and...
Read MoreJuly 13, 2017
UK financial services body the Prudential Regulation Authority (PRA) has issued a warning to insurers regarding the risk of claims for damages arising from...
Read MoreJuly 10, 2017
Joe Ferrara stresses that organisations need to continuously assess, train, reinforce the security message, and check how much users have learnt regarding social...
Read More
June 30, 2017
A recent Wombat Security Technologies survey of more than 2,000 working adults (half in the U.S. and half in the U.K.) found that 30 percent of respondents don't know...
Read MoreJune 28, 2017
News is currently breaking about a new widespread ransomware attack, striking large multinational companies across Europe, with Ukraine’s government, banks, state power...
Read MoreJune 23, 2017
Most security organizations have long since lost the fight to keep employees from using social media on work computers; indeed, many people now have to be on Facebook...
Read MoreJune 18, 2017
Digital security threats like ransomware and phishing attacks frequently make headlines these days. One would hope this publicity translates into heightened awareness...
Read MoreJune 16, 2017
As security becomes more complex organizations are tasked with making sure that it’s not just the IT department on the lookout for the next threat since malicious...
Read MoreJune 16, 2017
A look at some recent surveys and reports dealing with risk and compliance issues. Send surveys and reports to ben.dipietro@wsj.com. Red, White & Duped: A study of...
Read MoreJune 14, 2017
“We often find that those of us who work in cyber-security overestimate the knowledge the general public has on cyber-security risks and basic secure behaviours,” said...
Read MoreJune 14, 2017
The managed IT services market is arguably undergoing its most dramatic changes since its inception nearly 20 years ago. The need for businesses across all industries...
Read MoreJune 14, 2017
Awareness of phishing and ransomware attacks are considerably low, despite media reports of their increase. According to a survey by Wombat Security of 2000 adults...
Read MoreJune 13, 2017
A new report suggests that people in the UK are more aware of the terminology surrounding cyber security, and are less likely to fall victim to hacking and identity...
Read MoreJune 13, 2017
Wombat surveyed more than 2,000 working adults — 1,000 in the US and 1,000 in the UK — about cyber security topics and best practices that are fundamental to network...
Read MoreMay 30, 2017
Anyone who has spent any amount of time trying to secure their organization’s endpoints or network would not be surprised to learn that phishing is now the #1 delivery...
Read MoreMay 26, 2017
Thursday May, 25 2017 commenced the final countdown to the General Data Protection Regulation (GDPR): there is just one year before it comes into force. GDPR imposes...
Read MoreMay 25, 2017
Ten minutes, one hour, four hours, click. Postpone that annoying Windows update. Avoiding that dreaded dialogue box that pops up on the screen twice a day is a...
Read MoreMay 23, 2017
Mark Zuckerberg made headlines last year when a photo he posted on Facebook showed tape over his webcam on his laptop in the background. And an image of Steve Bannon...
Read MoreMay 23, 2017
The current editorial focus surrounding WannaCry is on the technological vulnerabilities which allowed the ransomware to breach so many devices and systems, but the...
Read MoreMay 23, 2017
In just a few days in mid-May, the world seemed to go into meltdown as a now-infamous ransomware campaign locked down hundreds of thousands of endpoints. From the NHS...
Read MoreMay 22, 2017
Fraud experts are warning UK netizens of a sophisticated new phishing scam which uses the recent WannaCry ransomware attack campaign in an attempt to trick users into...
Read MoreMay 18, 2017
If you’re doing things right on the password front (and chances are, you are), you have a clear password policy for your organisation, and end users are required to...
Read MoreMay 15, 2017
Around 200,000 systems have been hit by the malware WannaCry, resulting in doctors being blocked from gaining access to patient files and forcing emergency rooms to...
Read MoreMay 12, 2017
The cost of attacks against government infrastructure came into focus last week as agencies warned employees against opening phishing emails disguised as Google Docs...
Read MoreMay 12, 2017
Following the News that hospitals across England have been hit by a large scale cyber-attack. Hospitals across the country appear to have been simultaneously hit by a...
Read MoreMay 9, 2017
Ask an IT person what the weakest link in their organization’s security is, and you’ll invariably get a witty take on the same derisive answer: “Meatware.” “Our...
Read MoreMay 9, 2017
Of the many online threats out there, perhaps the most common and dangerous is the phishing email, in part because it’s proved to be so effective. Read on for a few...
Read MoreMay 8, 2017
The most recent Google-themed phishing attack shouldn’t have come as a surprise, but it did – and has affected around a million Gmail users. As Google succinctly ...
Read MoreMay 5, 2017
A massive phishing campaign impersonating a request to share Google Docs documents hit inboxes worldwide earlier this week. Victims who clinked on links in the emails...
Read MoreMay 4, 2017
Gmail users around the world have been hit with a sophisticated email scam using a malicious Google Docs app to hijack their inboxes and spam all their contacts. The...
Read MoreMay 4, 2017
Following the news that one million Google Docs users have been hit by a phishing scam, IT security experts from Vectra Networks, MWR InfoSecurity, Wombat Security,...
Read MoreMay 4, 2017
It took Google about one hour to acknowledge and reportedly block a Google Docs phishing scheme that was sweeping the web on Wednesday. The Google Docs phishing attacks...
Read MoreMay 3, 2017
Symantec’s recent Internet Security Threat Report (ISTR), Volume 22, reveals that 2016 was a banner year for cyber criminals whom achieved extraordinary attacks against...
Read MoreMay 2, 2017
Many small businesses fall under the false impression that criminals will only target large or even medium-sized businesses given the higher potential pay out; however,...
Read MoreApril 17, 2017
After Sept. 11, New York City's Metropolitan Transportation Authority came up with a tagline intended to make citizens aware that each person is on the front line when...
Read MoreApril 13, 2017
As Tax Day looms near, many individuals are likely scrambling to gather their 2016 tax documents to avoid missing the filing deadline. This year’s “extension” to April...
Read MoreApril 5, 2017
In the U.S., 35 percent of working-age adults do not know what phishing is. Considering the average office worker can see up to one risky email a day, that’s quite...
Read More
March 20, 2017
Most tech-savvy people think they’re clever enough to recognize a phishing attempt—and they should think again. Cyberattacks are getting smarter and criminals’ phishing...
Read MoreMarch 19, 2017
You know not to click on links in sketchy emails. Everybody knows that. And yet, people fall for these phishing attacks all the time. Case in point: The FBI suspects a...
Read MoreMarch 14, 2017
For fans of NCAA Men’s Basketball, there may be no greater sign of spring than Selection Sunday. Now that the matchups have been announced, the madness of March can...
Read MoreMarch 14, 2017
Pittsburgh technology startups bucked a national trend by attracting more venture capital investment in 2016 while national numbers sagged. Funding for Pittsburgh-area...
Read MoreMarch 9, 2017
March Madness brackets are about to be set this weekend, and over the course of the next four weeks more than 11 million viewers will tune in to watch the annual...
Read MoreMarch 6, 2017
Fully 47.48 percent of all phishing attacks last year were aimed at stealing victims' money, a 13.14 percent increase over 2015, according to Kaspersky Labs' Financial...
Read MoreFebruary 22, 2017
Wombat Security Technologies, a cybersecurity awareness and training company, has announced at HIMSS17 that it is expanding its U.S.-focused Healthcare Security...
Read MoreFebruary 22, 2017
No one wants to believe they'd fall for a phishing scam. Yet, according to Verizon's 2016 Data Breach Investigations Report, 30 percent of phishing emails get opened....
Read MoreFebruary 14, 2017
The CyberWire Daily Podcast is our look at what's happening in cyberspace. It provides a clear and concise summary of the news and offers commentary from industry...
Read MoreFebruary 13, 2017
The Internal Tax Revenue Service (IRS) earlier this month issued an urgent alert to all employers that an extensive W-2 e-mail phishing scam has permeated the corporate...
Read MoreFebruary 13, 2017
You don’t have to look hard to find the latest online shopping scam in the headlines. Regardless of whether you actively or occasionally shop online, it pays to be...
Read MoreFebruary 6, 2017
Device counts per household continue to rise, and mobile users are getting younger and younger. There is no “innate” understanding of how to use WiFi safely; on the...
Read MoreFebruary 5, 2017
If you’ve got an email account or social media profile, it’s likely you’ve come across phishing of some kind before. In a sentence, phishing is the fraudulent attempt...
Read MoreJanuary 30, 2017
Do you have the right technology, vantage points, processes, procedures, training, executive support, personnel, policy, controls, logs, etc., in place to duke it out...
Read MoreJanuary 24, 2017
Artificial intelligence can write, but its grammar tends to be lousy. Good news for cybercriminals: Twitter users don’t care. Grammatical shortcuts on micro-blogging...
Read MoreJanuary 23, 2017
Last September, Wombat Security released its 2016 Beyond the Phish™ Report, a cybersecurity awareness analysis that showed end-user knowledge gaps that pose significant...
Read MoreJanuary 23, 2017
When it comes to phishing, there’s been an encouraging 64% increase in organizations measuring end-user risk from 2015 to 2016. But the good news gets more scarce from...
Read MoreJanuary 22, 2017
In our household, Alexa is somewhat of a slacker. This is not her fault. If you let an artificial intelligence device just hang out with nothing to do for big chunks of...
Read MoreJanuary 19, 2017
Information security professionals are 10 percent less likely to report that their organization was the victim of a phishing attack in 2016 than in 2015, though that...
Read MoreJanuary 19, 2017
Phishing attacks are no longer just badly-worded emails asking for your social security number. They are growing in sophistication, persistence, and evolving into more...
Read MoreJanuary 19, 2017
According to a new report from security awareness training company Wombat Security, people are starting to get the message on phishing. When asked, 'What is...
Read MoreJanuary 19, 2017
According to new research, three in four (76 percent) organizations report being victims of phishing attacks. The findings indicate a 10 percent decrease from 2015. ...
Read MoreJanuary 10, 2017
Phishing attacks cost companies $5 billion globally last year. According to the Wombat 2016 State of the Phish™ report, 85% of all organizations...
Read MoreJanuary 9, 2017
A panel of industry insiders and experts share their cybersecurity predictions for 2017. 2017 has arrived, and, with it, many big cybersecurity issues. Hacking has...
Read MoreJanuary 3, 2017
This article was published in the January 2017 issue of STORES Magazine. Technology alone won't stop security threats to retail Trevor Hawthorn of Wombat Security...
Read More
December 14, 2016
With Black Friday just around the corner, here are some tips to make sure your site remains up and running. Make sure it is a holly jolly time of the year As IT Ops...
Read MoreDecember 13, 2016
Amy Baker, VP of Marketing, Wombat Security Phishing will continue to be a huge issue in 2017. In 2016, it's been another day, another email leak. Retrospectively, 2015...
Read MoreDecember 13, 2016
Mark Gazit, CEO, ThetaRay Because of the devastating hike in high-profile security breaches, as well as executive boards' increased emphasis on damage to reputation,...
Read MoreNovember 25, 2016
Experts from security awareness and training platform Wombat Security predict what's ahead for 2017 Through its security awareness and training software, Wombat...
Read MoreNovember 24, 2016
Last year, more than 40 million retail records were lost or stolen. And the recent Beyond the Phish Report revealed users in the retail industry incorrectly answered...
Read MoreNovember 22, 2016
Keep your info safe while holiday shopping. It’s the most wonderful time of the year. Folks who love to shop wait all year long for Black Friday and Cyber Monday. But...
Read MoreNovember 21, 2016
This past year, we saw a lot of hype around connected devices. These technologies have become so integrated into our daily lives and our business practices it’s hard to...
Read MoreNovember 17, 2016
Security professionals provide a forecast of what is in store for Internet of Things security next year. In 2016, we saw some of the first big IoT-fueled cyberattacks,...
Read MoreNovember 7, 2016
Just the worst If you've worked in IT long enough, you've learned to recognize certain types, people who fit into particular ecological niches. Sometimes they're great,...
Read MoreNovember 4, 2016
Humans are often the weak link in any cybersecurity defense. People behave unpredictably because we are sometimes driven by emotion and by an innate desire to trust and...
Read MoreNovember 2, 2016
In the months before an unexpected crisis, IT security requests specific tools, training, and additional staff to keep enterprise data safe, but does not substantiate...
Read MoreNovember 1, 2016
Safeguards With an ever-expanding mobile workforce, infosec teams are increasingly tasked with extending cybersecurity safeguards beyond the physical and virtual...
Read MoreOctober 25, 2016
The Friday cybersecurity attack using connected devices, or the Internet of Things, was serious, unusual and even historic. It also is a taste of the disruptions to...
Read MoreOctober 24, 2016
As the IoT industry matures, it’s safe to say we’re well past “early adopter” phase and seeing broader development and deployment. While the prospect of a more...
Read MoreOctober 13, 2016
Given the hundreds of billions of dollars invested in technology over the years, one might expect a dramatic improvement in worker productivity. But arguably, that...
Read MoreOctober 13, 2016
Since it’s National Cyber Security Awareness Month, and with the increasing amount of connected homes, systems and trendy devices, consumers need to stay informed about...
Read MoreOctober 11, 2016
Not long ago, the Department of Homeland Security directed extra attention to voter registration hacking threats. The recent news that the Arizona voter registration...
Read MoreOctober 3, 2016
Earlier this year, Atlantic Health System circulated an email informing employees they had received a raise. The email said employees would earn the salary boost...
Read MoreOctober 2, 2016
By now, you all have likely heard Yahoo! confirmed 500 million accounts were stolen from the company in 2014, releasing names, email addresses, personal records and...
Read More
September 26, 2016
The decision earlier this month by the U.S. Securities and Exchange Commission to issue a declination to communications and technology company Harris Corp. is the first...
Read MoreSeptember 23, 2016
Are you at risk of identity theft? What about Verizon's deal to buy Yahoo? And who the heck has your information? Half a billion Yahoo accounts were unlawfully...
Read MoreSeptember 23, 2016
Hashtag Dangerous: A report on workplace cybersecurity issues by Wombat Security Technologies found safe use of social media is a top challenge for employees and...
Read MoreSeptember 22, 2016
Breaches and attacks have run rampant through most major industries, and organizations are beginning to realize the importance of employee and stakeholder security...
Read MoreSeptember 21, 2016
You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing...
Read MoreSeptember 17, 2016
FBI Director James Comey does it and thinks you should, too. A piece of tape or cover to block the webcams built into laptop screens can serve as a robust...
Read MoreSeptember 15, 2016
Security awareness training is one of the most effective ways to strengthen what is generally known as “the weakest link in the security chain.” The key is to make...
Read MoreSeptember 13, 2016
Speaking at the Gartner Security & Risk Summit in London this week Wombat Security’s CEO Joe Ferrara explored what lies ‘beyond the phish’, with particular focus on...
Read MoreSeptember 13, 2016
Employees at Axe Investment, the fictional firm of biollionaire Bobby Axelrod in Showtimes new series, Billions, were downright angry when they learned that surprise...
Read MoreSeptember 9, 2016
Phishing continues to be a large and growing problem for organizations of all sizes. As pioneers in the use of simulated phishing attacks, Wombat Security, strongly...
Read MoreSeptember 7, 2016
A recent survey shows that phishing is one area where healthcare cybersecurity knowledge gaps could potentially pose a risk to the industry. There is a need for both...
Read MoreSeptember 7, 2016
Canadian Underwriter September 7, 2016 More than 8 in 10 organizations were victims of phishing scams in 2015, a 13% increase over 2014, according to companies...
Read MoreSeptember 6, 2016
The Wombat Security report found even though social media poses a security risk for businesses, the specific security threats are poorly understood. Social media and...
Read MoreSeptember 6, 2016
Email phishing scams are regularly used by cybercriminals who want to spread ransomware and gain access to sensitive personal and business information—and phishing...
Read MoreSeptember 2, 2016
Many of the cybersecurity threats prevalent today such as oversharing on social media, unsafe use of Wi-Fi, and company confidential data exposure contributes to the ...
Read MoreSeptember 2, 2016
There's a reason why cyber attacks use social engineering techniques, it's because the person sitting in front of the screen is usually the weakest link in the security...
Read MoreSeptember 2, 2016
Here phishy phishy phishy…said no enterprise ever. Officially, that is. The reality is that oblivious employees are practically chumming the water with...
Read MoreSeptember 1, 2016
Wombat Security Technologies (Wombat), a leading provider of cyber security awareness and training, has announced the release of its Beyond the Phish™ Report,...
Read MoreSeptember 1, 2016
Safe social media use is the top cybersecurity challenge for employees, according to the latest report from Wombat Security Technologies on security awareness issues...
Read MoreAugust 15, 2016
When Wombat Security Technologies and ThreatSim (acquired by Wombat in October 2015) decided to develop and deploy our suite of end user risk management and education...
Read MoreAugust 15, 2016
Until recently, Joel and Justin Johnson were nomads. Before landing in Pittsburgh three years ago, the brothers and co-founders of BoXZY had lived in several cities:...
Read MoreAugust 1, 2016
In 1999, I moved out of my parents’ house in California to take a job with an Internet company in Virginia. The move was a big deal—as was the job. The company I was...
Read More
June 27, 2016
Ask what department is responsible for data security in an organization and the most likely answer is, “IT.” But some experts are saying it shouldn’t be IT alone – that...
Read MoreJune 9, 2016
On any given day, between 50 and 100 email messages land in my spam filter, and maybe one ended up there by accident. A few are legitimate emails, trying to sell me...
Read MoreJune 8, 2016
In its newest Phishing Activity Trends Report, the APWG noted a 250% increase in phishing sites between October 2015 and March 2016 — and the 2016 uptick indicates an...
Read MoreJune 6, 2016
The Anti-Phishing Working Group has found that the number of observed phishing attacks in Q1 2016 hit a 12-year high. In its Phishing Activity Trends Report [PDF],...
Read MoreMay 8, 2016
Everyone in information security should know that business email compromise (BEC) attacks are on the rise. However, many security professionals may not realize how...
Read More
March 28, 2016
Your employees are an important line of defense against a data breach or cyber attack that could lead to financial or reputation loss for your company. Increased...
Read MoreMarch 23, 2016
Microsoft released a new feature in Office 2016 that helps administrators prevent macro-based malware infections. Microsoft is making it tougher for enterprises to...
Read MoreMarch 16, 2016
These days, a keen awareness of security matters is vital for continued growth. Those who don't have a good handle on security are more likely to be breached, their...
Read MoreMarch 4, 2016
The RSA conference is one of the largest gatherings of cybersecurity vendors, researchers and programmers in the world, with an estimated 40,000 attendees descending...
Read MoreFebruary 29, 2016
In the second half of 2015, 52 percent of new and updated apps were unwanted or malicious—a significant increase over the first half of 2014. Malware and...
Read MoreFebruary 18, 2016
The platform scans reported emails and examines them based on standard security indicators of compromise, and the emails are then prioritized. Security specialist...
Read MoreFebruary 17, 2016
While the digital landscape remains a dangerous playing field, companies in every industry are all but required to take to the web. In the purview of hackers is the...
Read MoreFebruary 4, 2016
House staffers who opened their inboxes Thursday morning found a fake news item that implied it was from LegiStorm - and House officials were behind the ruse. The...
Read MoreFebruary 1, 2016
The report found the most popular phishing attack templates with the highest click rates are items employees expected to see in their work email. Phishing attacks...
Read MoreJanuary 28, 2016
Despite the emergence of numerous new and sophisticated attack methods, cyber criminals and hackers continue to turn to phishing attacks, which are increasing in...
Read MoreJanuary 28, 2016
Phishing attacks have increased 13 percent and spear phishing attacks are up 22 percent from 2014, according to new research from Wombat Security Technologies. The "
Read MoreJanuary 28, 2016
Wombat Security Technologies recently announced its latest report on phishing attacks, State of the Phish 2016. Among the key results in the report was that these...
Read MoreJanuary 27, 2016
On Wednesday, Wombat Security Technologies released its 2016 State of the Phish report, detailing the current phishing landscape. The research report found that,...
Read MoreJanuary 27, 2016
According to a new report from security awareness specialist Wombat Security phishing attacks are on the rise and are supported by increasingly aggressive social...
Read MoreJanuary 27, 2016
Phishing attacks continue to grow in volume and complexity, supported by more aggressive social engineering practices that make phishing more difficult to prevent. ...
Read MoreJanuary 25, 2016
With the continuing rise in the popularity of social media platforms as more people embrace posting personal details of the minutiae of everyday life, hackers are...
Read More
December 30, 2015
Ransomware has come back into the spotlight, with a Krebs on Security report highlighting a recent attack targeting Linux web servers — in addition to consumers and...
Read MoreDecember 29, 2015
Cybercriminals have already begun targeting additional medical records by launching more malware and phishing attacks as they prey on retailers in a concerted effort to...
Read MoreDecember 28, 2015
Five years ago, compiling a list of the rising stars on the local tech startup scene was a fairly straight-forward task. Investment experts and educators generally...
Read MoreDecember 11, 2015
DigiCert, the SSL certificate provider, verifies the authenticity of secure websites so as to prevent online phishing scams. So it should come as no surprise that the...
Read MoreDecember 8, 2015
Ransomware has come back into the spotlight, with a Krebs on Security report highlighting a recent attack targeting Linux Web servers—in addition to consumers and...
Read MoreDecember 1, 2015
At Wombat Security, cyber awareness and training initiatives are central to our mission of changing employee behaviors and reducing risk to organizations. Education is...
Read MoreNovember 19, 2015
The result of significant growth, Pittsburgh’s Wombat Security Technologies was recently rated North America’s 104th fastest-growing company on the Deloitte's...
Read MoreOctober 26, 2015
The U.S. Postal Services received some frustrating news in early October from the Office of the Inspector General on the effectiveness of its security awareness...
Read MoreOctober 23, 2015
Social engineering attacks are not only becoming more common against enterprises and SMBs, but they're also increasingly sophisticated. With hackers devising ever-more...
Read MoreOctober 14, 2015
Wombat Security Technologies has announced the acquisition of ThreatSim. Wombat will integrate ThreatSim’s spear-phishing solutions and other capabilities with its...
Read MoreOctober 14, 2015
Wombat Security is a recognized leader in security awareness training and now it just got better with the acquisition of ThreatSim. ThreatSim has a unique focus on...
Read MoreOctober 14, 2015
Wombat Security announced today that it is acquiring ThreatSim —a company that focuses on spear phishing prevention. The move magnifies Wombat’s security awareness...
Read MoreOctober 14, 2015
Adding to its cybersecurity offerings, Pittsburgh-based Wombat Security Technologies has acquired ThreatSim, a Reston, Va.-based provider of spear phishing attack...
Read MoreOctober 10, 2015
The goal of any security awareness and training program should be to reduce risk. Unfortunately, some programs could actually end up increasing vulnerability for one...
Read More
September 30, 2015
If even well-educated security experts mess up when it comes to security, can we really educate average employees to be more security aware? The other day, I was in a...
Read MoreAugust 28, 2015
A new report from Ponemon Institute LLC, The Cost of Phishing & Value of Employee Training, has put a number on the yearly costs of phishing breaches for the average...
Read MoreAugust 27, 2015
When Wombat Security Technologies moved from North Oakland to the Strip District last year, the company listened to employee feedback and changed parts of its office...
Read MoreAugust 27, 2015
The extrapolated total annual cost of phishing for the average organization is more than $3.7 million, a number that could be shaved down by $1.8 million with the right...
Read MoreAugust 27, 2015
In the world of logistics, perhaps the greatest compliment that can be given to a corporate leader is that he “keeps things going.” That was how one employee described...
Read MoreAugust 26, 2015
Costs incurred by organizations as a result of successful phishing attacks are mostly related to employee productivity loss and uncontained credential compromises,...
Read MoreAugust 26, 2015
Successful phishing attacks can lead to costs from loss of employee productivity and credential compromise, among other factors, which together may cost an average...
Read MoreAugust 26, 2015
A new research report by Ponemon Institute finds that a comprehensive security training program with a continuous training methodology can improve the phishing email...
Read MoreAugust 26, 2015
The start of school again brings new cyber security risks, say experts, and it’s important to commit basic cyber security tips to memory. Wombat Security provides these...
Read MoreAugust 26, 2015
The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks, according to a new report from the Ponemon Institute. The report, which...
Read MoreAugust 26, 2015
In-brief: A report from the Ponemon Institute puts the annual cost of phishing attacks at $300,000, much of it due to lost productivity. Can that number be believed?...
Read MoreAugust 7, 2015
Have you ever received an e-mail that urges you to act quickly and provide your username and password, or one that asks for your birth date and Social Security number...
Read MoreAugust 3, 2015
This story is part of Surveillance Society, a series examining the implications of privacy intrusions, many of which occur on a daily basis. For more stories in the...
Read MoreJuly 17, 2015
Data is exploding, and there’s no sign of a slowdown. Just how big is big data? Consider DOMO’s April 2014 Data Never Sleeps 2.0 infographic, which boiled data...
Read MoreJuly 3, 2015
Baseball. Football. Monkey. Using any of those words — all of which landed in the Top 20 on a list of the 500 worst passwords of all time — to protect online accounts...
Read More
June 25, 2015
Global spending on IT security just keeps going up and up. According to Gartner, worldwide spending increased 7.9 percent in 2014 over 2013, and 2015 has seen another...
Read MoreJune 16, 2015
Summary: As technology evolves at an ever-increasing pace, it brings major changes to the IT department. In this era, the IT department moves from a back-office...
Read MoreJune 9, 2015
It seems like once a week, we see yet another story about a security failure involving passwords. In May alone, for instance, the news came that an unpatched...
Read MoreJune 5, 2015
The onslaught of high-profile breaches over the past year at companies such as JP Morgan, Home Depot, and Sony Pictures forced businesses to spend exponentially more...
Read MoreMay 25, 2015
Whether you're taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your...
Read MoreApril 16, 2015
Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile threats are the most problematic for security pros? Mobile communications are an...
Read MoreApril 15, 2015
Malware, phishing scams and other old-fashioned hacking techniques took the lead as the primary causes of more than 2,000 confirmed data breaches last year that were...
Read MoreApril 13, 2015
A relentless barrage of cyberattacks has left many corporate security officers searching for a clearer, common understanding of what constitutes good security strategy,...
Read MoreApril 9, 2015
Times are changing dramatically in IT security. Cybercriminals have figured out one of the best ways to steal company jewels is not breaking through levels of...
Read MoreApril 7, 2015
You're in the minority for a reason. Here's why. I’ve heard any number of cyber security professionals downplay the effectiveness of employee awareness and training...
Read More
March 27, 2015
As more personal and corporate information is shared on the Web, social engineering techniques and attacks are becoming increasingly sophisticated, forcing enterprises...
Read MoreMarch 25, 2015
Once upon a time — say, seven or eight years ago— setting up your home computer with antivirus software, and then maybe adding a firewall, was all you would need to do...
Read MoreMarch 17, 2015
Social engineering is nothing new. In 1849, Samuel Williams, the original "confidence man," as the newspapers named him, engineered gullible strangers out of their...
Read MoreMarch 12, 2015
Wombat is enabling the large organization to reduce its susceptibility to cyber security attacks, saving hundreds of hours in remediation time. Wombat Security...
Read MoreFebruary 12, 2015
The next phishing email you get could be from your boss. With high-profile security breaches on the rise, from Sony Pictures to Anthem, companies are on the defensive....
Read MoreFebruary 11, 2015
Like precocious teenagers, some employees don’t want to be told what to do when it comes to cyber security. Too many rules about what they can and cannot do with...
Read MoreFebruary 4, 2015
Most successful companies of today, whether enterprises, mid-market, or small small businesses, are either based online or have a firm presence online. And the reality...
Read MoreJanuary 29, 2015
Download the Aberdeen Report: The Last Mile in IT Security: Changing User Behaviors with Wombat's Security Education Solutions. Download Report
Read MoreJanuary 16, 2015
Whilst companies employ an array of sophisticated technology to combat security risks, often the weakest link remains the person sitting in front of the screen. New...
Read MoreJanuary 15, 2015
Whilst companies employ an array of sophisticated technology to combat security risks, often the weakest link remains the person sitting in front of the screen. New...
Read MoreJanuary 15, 2015
Time after time, attackers seem to find ways to get users to open an attachment. Throwing technology at this is one way to address the issue. Another is through...
Read MoreJanuary 14, 2015
Increased investment in employee training can reduce the risk of a company's cyber security attack by up to 70 percent, according to a new study. The analysis,...
Read MoreJanuary 14, 2015
A new study from Wombat Security and Aberdeen Group shows that boosting cybersecurity awareness and education among employees can reduce enterprise security risks and...
Read More
December 4, 2014
Over the last week, Costco became the latest victim of phishing. Every day another mega company joins the list. In one recent instance, more than 56 million customer...
Read MoreNovember 17, 2014
A little-known fact about wombats is they become fiercely protective when they’re provoked. For this reason, three faculty members at Carnegie Mellon University decided...
Read MoreNovember 12, 2014
The platform includes auto-enrollment in training modules, which helps ensure that users most susceptible to attack are being trained first. Cyber-security awareness and...
Read MoreNovember 5, 2014
Employee security awareness training has been derided in the past, but new Gartner research suggests that a market of competitive, high-quality vendors are making...
Read MoreNovember 5, 2014
It's hard to miss investment in Pennsylvania when it takes the form of a downtown high rise or new sports complex, but if you're not in the business community, you may...
Read MoreOctober 22, 2014
Wombat Security Technologies (Wombat), a leading provider of cyber security awareness and training solutions, today announced Gartner, Inc. has positioned Wombat as a...
Read MoreOctober 16, 2014
Download the 2014 Gartner Magic Quadrant Report on Security Awareness Computer-Based Training Vendors. Wombat was named a Leader in this report. Download Report
Read More
September 29, 2014
It's every security professional's nightmare. All your best security measures: rendered useless by one great social engineering attack, one lost smartphone, or one weak...
Read MoreSeptember 25, 2014
As CEO of a leading cyber security education company, I continue to be shocked by the increasing number of successful phishing attacks and what this means to the...
Read MoreSeptember 3, 2014
Phishing attacks aren't going away any time soon. The mindset that eventually someone will find a technology that prevents this type of attack is wishful thinking. As...
Read MoreAugust 4, 2014
Ask a roomful of IT managers and chief information security officers at credit unions if the users are their biggest information security risk and almost every arm in...
Read MoreJuly 31, 2014
At the Black Hat USA 2014 Conference, the following July edition of Cyber Defense Magazine was distributed to attendees. In it, Joe Ferrara, CEO of Wombat Security...
Read MoreJuly 22, 2014
Summary: Many businesses treat the “Bring Your Own Device” (BYOD) movement as a trend–viewing it as something they can choose to ignore. Learn why this approach is...
Read MoreJuly 10, 2014
Pittsburgh Business Timesby Patty TascarellaJuly 10th, 2014 Pittsburgh-based cybersecurity firm Wombat Security Technologies has raised $6.73 million. Leading the...
Read More
June 13, 2014
Whether it’s a shadowy foreign gang seeking digital back channels into nuclear facilities or a lone hacker digging for a database of consumer passwords, the...
Read MoreMay 21, 2014
Ask a roomful of IT managers and chief information security officers (CISOs) if end users are their biggest information security risk and almost every arm will shoot up...
Read MoreMay 19, 2014
When you receive an email from a purported prince asking for help to transfer money, you have learned by now to delete it and never, ever click on any links it contains....
Read MoreMay 2, 2014
If the folks at TrustCC attempt to penetrate your security systems, chances are they’ll have some bad news for you. Tom Schauer, CEO of the University Place, Wash.-based...
Read MoreApril 30, 2014
Specialist in securing corporate information Espion, has been shortlisted for a whopping three categories: “Best Place to Work in IT”; “Best Use of Technology in...
Read MoreApril 24, 2014
If you sent a phishing email to your employees, how many would open it and click on a link inside? Wombat Security Technologies conducts simulated phishing attacks — the...
Read MoreApril 22, 2014
It's a busy day in your company and everyone is rushing around trying to respond to requests. Audrey gets an email that looks like it's from a partner asking her to look...
Read More
March 27, 2014
by Nathan EddyeWeekMarch 27, 2014 The company specializes in information security awareness and training software to help organizations teach their employees secure...
Read MoreMarch 4, 2014
Dell SecureWorks, an industry leader in information security services, is adding two new services to its portfolio of Security Awareness Training Solutions: Managed...
Read MoreFebruary 13, 2014
Wombat Security will provide CIOsynergy attendees with best practices in security awareness and training that help employees learn secure behavior. CIOsynergy, a...
Read MoreFebruary 12, 2014
Spear-phishing has become the scourge of the internet. It is the primary method used by the Syrian Electronic Army to gain the credentials it uses for its many and...
Read MoreFebruary 11, 2014
The Internet is the best thing that could ever have happened to us, and its value can perhaps never be really gauged, but (there's always one) on the flip side, there's...
Read MoreJanuary 24, 2014
Nicole Wong, a veteran of Google and Twitter who last year became the White House's first chief privacy officer, will be the keynote speaker for Carnegie Mellon...
Read MoreJanuary 14, 2014
Internet scammers are targeting shoppers worried about their credit ratings following December's security breach at Target, state officials say. In a news release...
Read More
November 19, 2013
It is an old mantra when it comes to IT security that the user is the weakest link, but it is one that must be addressed. Technology helps: for example, through the use...
Read MoreNovember 18, 2013
The rock: Users want to use their smartphones for work. The hard place: Security is deficient. All CIOs are caught between the two. A high-potential millennial told the...
Read MoreNovember 15, 2013
A year ago, James Robinson played a trick on about 600 salespeople at a company where you wouldn't expect the employees to be easily fooled. Staffers at Websense Inc....
Read MoreOctober 2, 2013
Earlier this year, employees at a prominent media company received a strange email asking them to reverify their accounts. These emails didn't come from a web hosting...
Read More
September 19, 2013
By helping users understand that they can be part of the security solution, Joe Ferrara of Wombat Security says simulated phishing attacks can mend the often difficult...
Read MoreSeptember 12, 2013
The company says simulated phishing attacks, along with Wombat's training, have caused a more than 80 percent reduction in susceptibility to attack. Wombat Security...
Read MoreSeptember 10, 2013
Wombat Security Technologies (Wombat), a leading provider of cyber security awareness and training solutions, today announced their anti-phishing training suite. The...
Read MoreAugust 27, 2013
Collaboration both identifies the source and nature of emerging phishing threats and provides effective user training to reduce susceptibility to cyber attack. Malcovery...
Read MoreAugust 7, 2013
Phishing attacks are growing off the chart, and while we're not surprised by the numbers of attacks we are seeing, the dirty little secret chief security officers don't...
Read MoreAugust 7, 2013
Features of the program include the ability to monitor employee completion of assignments and deliver automatic reminders about training deadlines. Cyber-security...
Read MoreJuly 9, 2013
Phishing attacks continue to succeed with alarming regularity, and the problem is not just limited to regular employees. Everyone in the organization, from the...
Read MoreJuly 1, 2013
All that IT security training that companies are giving rank-and-file employees may well be needed for those at the top, according to findings from Wombat Security...
Read MoreJuly 1, 2013
Getting senior management on board is essential for an effective security policy; but new figures show that management isn't merely a part of the solution - where...
Read More
June 3, 2013
I continue to be surprised by the number of organizations that seem to think they are doing everything they can to protect themselves, their employees and their...
Read MoreMay 23, 2013
Phishing clearly works and is on the rise. It's often the first step in targeted attacks – so-called Advanced Persistent Threats (APTs). Why has it become so popular...
Read MoreApril 15, 2013
Does security awareness training actually help? When it comes to phishing and spear-phishing attacks, many executives appear to think it does make a difference. Many...
Read MoreApril 12, 2013
The following news clip is from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), which is part of the Department of Homeland Security: A recent...
Read MoreApril 10, 2013
Questions on the value of security awareness training are perennial. They have come to the fore recently following comments by Bruce Schneier: “I personally believe that...
Read MoreApril 10, 2013
CSOs share advice, war stories on internal simulated phishing attacks for user awareness training Simulated phishing attacks are gradually becoming a more accepted...
Read MoreApril 9, 2013
Wombat released a new report that discusses how simulated phishing attacks can be an effective security awareness and training tactic to help companies educate employees...
Read More
February 27, 2013
Anti-phishing firm Wombat Security Technologies is finalizing a $1 million funding round and has already closed on $815,000. The remaining funds are expected to close in...
Read MoreFebruary 20, 2013
The interactive training modules teach employees about social engineering, smishing attacks, malicious URLs and overall smartphone smartphone security. Cyber security...
Read MoreFebruary 19, 2013
I like to believe that it is very good for our health if we learn something new every day. Well, today I learned a new word thanks to Wombat Security Technologies, and...
Read MoreFebruary 11, 2013
Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk...
Read MoreJanuary 30, 2013
Technology opens up a world of information. But with big convenience comes a big risk. According to software-maker Rapid 7, nearly 40 million and 50 million devices,...
Read MoreJanuary 30, 2013
Bring your own device (BYOD) policies have altered the marketplace and forced managed services providers (MSPs) to adapt new strategies, however, educating clients on...
Read MoreJanuary 29, 2013
The current method of securing a network is to believe users will never understand why the IT team is throwing software and hardware at security issues. And yet security...
Read More
December 27, 2012
The consumerization of IT will continue to wreak havoc on IT departments in 2013 as the rise of bring-your-own-device (BYOD), cloud computing and social media...
Read MoreDecember 26, 2012
(CBS News) Smartphones landed in many stockings this Christmas season, and with more than a billion smartphone users worldwide, revenue from applications could soon...
Read MoreNovember 26, 2012
Security technologies go only so far; employees and cultures need to be trained While the variety and sophistication of cybersecurity technologies has expanded...
Read MoreNovember 16, 2012
Clearly there is a need to do a better job educating workers about IT security risks and threats and to teach them how to be part of the security solution rather than...
Read MoreOctober 4, 2012
SaaS product enables security officers to assess and train employees not to use removable memory devices of unknown origin Wombat Security Technologies (Wombat), a...
Read More
September 28, 2012
Following the success of its cybersecurity training product, Wombat Security Technologies has seen growth take off. Over the past year, the company has nearly doubled...
Read MoreSeptember 18, 2012
There’s been a lot of debate lately about whether or not cyber security training is worth the investment. To engage in this debate, it is important that all parties have...
Read MoreSeptember 4, 2012
Wombat Security Technologies is in the business of threat filtering and user training. For this month, we looked at their training. The cornerstone of Wombat training is...
Read MoreAugust 23, 2012
There’s been a lot of debate lately about whether or not cyber security training is worth the investment. To engage in this debate, it is important that all parties have...
Read MoreAugust 6, 2012
There’s a spirited debate going on about the value of training employees for security awareness. It started in May 2012 with Joe Ferrara’s article for CSO magazine, Ten...
Read MoreJuly 19, 2012
In the first part of this series, Joe Ferrara, president and CEO of Pittsburgh-based Wombat Security Technologies, offered suggestions on shielding sensitive agency...
Read MoreJuly 18, 2012
Technologies such as anti-virus, safe browsers, and firewalls cannot help if the user clicks on the wrong link or visits the wrong website, warns security firm Wombat...
Read MoreJuly 12, 2012
Government administrators need to safeguard data, says Joe Ferrara, president and CEO of Pittsburgh-based Wombat Security Technologies. The company offers cyber-security...
Read More
June 29, 2012
A new report from ICS-CERTshows the number of reported incidents increased from 9 to 198 from 2009 and 2011 U.S. critical infrastructure companies saw a dramatic...
Read MoreJune 28, 2012
Wombat Security Technologies just released new PhishGuru 3.0 anti-phishing training software. Wombat Security Technologies recently announced the newest release of...
Read MoreMay 25, 2012
Read the PhishGuru review at PC Magazine.
Read MoreMay 18, 2012
Phishing — or the use of highly targeted e-mails to induce users to divulge passwords or use malware — is a problem for all companies. In this invited editorial,...
Read MoreMay 16, 2012
10-Minute Module Teaches Data Security to Users By Dian Schaffhauser A company founded by computer science faculty members at Carnegie Mellon University that specializes...
Read MoreMay 11, 2012
An article posted to Barracuda Labs Internet Security Blog warns that scammers are now tailoring their phishing messages to prey on people who commonly use their...
Read MoreMay 10, 2012
For many Department of Defense employees, a new policy encouraging working from home could be an opportunity to nix stressful Beltway commutes, concentrate in...
Read MoreMay 3, 2012
Skip the boring lectures and understand how people really learn new information and habits Joe Ferrara, Wombat Security Technologies, CSO Information security...
Read MoreApril 28, 2012
Wombat provides security awareness training tips for employees to work securely away from the office. Every security officer should teach their employees these tips to...
Read MoreApril 11, 2012
Wombat Announces Channel Parter Program, Announces First Partner Cyber security training firm Wombat Security Technologies is broadening its reach with the launch of a...
Read More
March 19, 2012
Credit: Apple Inc./Image composite by SecurityNewsDaily Introduction There's no doubt that we users are our own worst enemies when it comes to security on...
Read MoreMarch 14, 2012
IRS Warns Taxpayers About Latest Phishing Scams As tax season approaches, the Internal Revenue Service (IRS) is warning taxpayers about phishing scams designed to trick...
Read MoreMarch 13, 2012
Wombat Security Technologies Offers Tips to Keep Online Users Off the Hook During Tax Season When people check their personal email from work devices, especially emails...
Read MoreMarch 2, 2012
Solutions to Meet Mobile Device Security, Compliance Objectives Wombat's Smartphone Security Training module includes tips on how to use smartphones safely inside and...
Read MoreFebruary 29, 2012
8th Annual 2012 Info Security's Global Excellence Awards Wombat Security Technologies, Inc. announced today that Info Security Products Guide, the industry's leading...
Read MoreFebruary 26, 2012
Western Pennsylvania firms strive to provide cyber security solutions As cyber attackers grow more sophisticated, so do the efforts to thwart them. Several companies and...
Read MoreFebruary 16, 2012
Get Users to Care About Security Your employees are a critical part of your security program, particularly when it comes to the endpoint. Whether it’s a PC, smartphone...
Read MoreFebruary 13, 2012
Wombat Continues to Make Learning about Security Fun I last wrote about Wombat a few months back.They are a company that was spun out of Carnegie-Mellon University and...
Read MoreJanuary 31, 2012
Del Monte joins select group of customers co-developing Wombat’s rapidly- expanding suite of cyber security training modules Wombat Security Technologies, a leading...
Read MoreJanuary 2, 2012
While conducting research on phishing, Norman Sadeh and his colleagues at Carnegie Mellon University noticed something surprising. A significant percentage of their...
Read More
December 16, 2011
Founded in 2008, Wombat Security Technologies grew out of cyber security research by the company Co-Founders at Carnegie Mellon University. Wombat provides innovative...
Read MoreDecember 10, 2011
If the experts are right expect more advanced persistent threats, ransomware, social media ID theft, and requirements for IT security certification.Here it is, so you...
Read MoreDecember 8, 2011
Anti-phishing firm Wombat Security Technologies offers these six tips to help consumers and business avoid phishing email scams designed to steal sensitive information:
Read MoreDecember 8, 2011
Phishing is old news — which is part of why it's so dangerous today.Many bank employees learned long ago what a phishing email is and how to look out for one. But the...
Read MoreDecember 8, 2011
In the world of corporate information technology, 2011 was all about security. We saw that hackers have become increasingly sophisticated and persistent in their efforts...
Read MoreDecember 7, 2011
A year of historic breaches at RSA, Epsilon, Lockheed Martin and even the Sony PlayStation Network, demonstrates how ineffective the best security technologies can be...
Read MoreNovember 30, 2011
First came Phil, the anti-phishing fish who taught employees how to fend off internet predators. Then Phyllis jumped into the pool to help us learn to identify...
Read MoreNovember 23, 2011
A student at Blairsville High School in Indiana County raised his hand during class last month and asked his teacher if a 10-digit number he recited sounded familiar,...
Read MoreOctober 31, 2011
Joe Ferrara, president and CEO of cyber security training startup Wombat Security Technologies chuckled when I asked him for his top online tips. It’s a question he gets...
Read MoreOctober 28, 2011
Not every cyber security threat is as easy to spot as that Nigerian banker’s email promising millions of dollars in exchange for passwords or bank account numbers. More...
Read MoreOctober 20, 2011
A year of historic breaches from RSA, Epsilon and Lockheed Martin to the Sony PlayStation Network, demonstrates how ineffective the best security technologies can be...
Read MoreOctober 7, 2011
This week, the Pittsburgh Business Times ranked the 2010-11 Innovation Works & Pittsburgh Life Sciences Greenhouse investments. Tied at No. 4 on the list was Wombat...
Read MoreOctober 4, 2011
TechBurgerOctober 4, 2011 October is Cyber Security Awareness Month and Wombat Security Technologies has a free webinar that teaches businesses about the best practices...
Read More
September 6, 2011
Solution providers who provide security software, such as email filters, Web filters or antivirus products, are primed to offer an additional, revenue-generating...
Read MoreSeptember 6, 2011
It's been another wild and crazy week for the security community. Scotland Yard arrested two suspected members of Anonymous and LulzSec Thursday. Meanwhile, the major...
Read MoreSeptember 1, 2011
Our goal is to develop a web-based platform that can (1) host a collection of micro games for security training, (2) simplify the task of developing games by providing...
Read MoreAugust 31, 2011
I am always on the look out for new security companies that are doing things a little differently. I came across a good one a few weeks back courtesy of my friend Liz...
Read MoreAugust 16, 2011
Rather than provide security alerts when suspicious messages arrive in employee inboxes, Pennsylvania-based Wombat Security Technologies trains employees by actively...
Read MoreAugust 16, 2011
Wombat Security Technologies(Wombat) today announced the latest enhancements to PhishGuru, its anti-phishing email assessment and training service. Version 2.0 of...
Read MoreAugust 16, 2011
Wombat Security Technologies (Wombat) ) today announced the latest enhancements to PhishGuru, its anti-phishing email assessment and training service. Version 2.0 of...
Read More
May 25, 2011
The Governing Body of CIOs who create the agenda understand that there is ‘strength in numbers’, and the challenges and opportunities faced by one organization are...
Read MoreMay 12, 2011
Do you think of phishing as a consumer problem and not a concern for enterprise networks? If you said yes, you'd better think again. According to the Verizon 2010 Data...
Read MoreFebruary 12, 2011
Dr. Jason Hong - CTO, Wombat Security Technologies and Assoc. Prof. Carnegie Mellon University "Teaching to Behavioral Change" Read More: http://www.issa.org/ciso/?p=250
Read More