Security - Outflank Terranova

When a C-suite executive’s legitimate email account is hijacked via token theft (not a password phish), the resulting malicious email comes from a known, trusted sender. It passes the "Terranova test." No spoofed domain, no odd grammar—just a real email from a real boss asking for an urgent gift card purchase or wire transfer. The training never triggers because the user did everything correctly. The flank succeeded because the trust was legitimate, not simulated. Terranova’s core metric is the email click rate. Attackers have simply moved the battlefield.

For nearly two decades, Terranova Security has built a fortress out of behavior. Their mantra is simple yet powerful: turn end-users from the weakest link into a human firewall. Through rigorous phishing simulations, micro-learning modules, and the celebrated “Terranova Method”—which focuses on positive reinforcement over punishment—they have helped organizations reduce click rates on malicious emails from over 30% to under 5%. outflank terranova security

Terranova’s desktop simulations never flagged it. The corporate web proxy never saw it. The flank is complete. Terranova famously advocates for positive reinforcement—never shaming users who fail simulations. Psychologically, this is sound. But sophisticated attackers have weaponized this culture of psychological safety. When a C-suite executive’s legitimate email account is