You've requested...

Share this with your colleagues:

Download this next:

Anti-phishing: The effectiveness of banners

Putting banners in email to alert recipients to the potential dangers lurking in messages can be a highly effective way to keep employees safe from phishing attacks. But for this to be effective, you have to know which emails to flag.

View this white paper to learn how INKY’s Phish Fence determines which emails to warn users about based on criteria such as:

  • Potential sender forgery
  • Brand impersonation
  • First-time sender
  • And more

These are also closely related to: "Trend Micro Hosted Email Security"

  • Why targeted phishing requires extra defense

    As threats grow in sophistication and number, traditional defenses frequently fail to detect and remediate phishing, business email compromise and targeted ransomware attacks.

    This is not to say SEGs and their native cloud equivalents like Microsoft Defender of Office 365 (ATP) are obsolete. SEGs and ATP play a key role in keeping users’ mailboxes free from spam, most malware and well-known phishing threats.

    However, businesses need to complement these technologies with specialized detection and automated remediation to solve the currently unsolved problems associated with targeted phishing.

    Read this blog post to learn how Cyren Inbox Security aims to help.

  • Boom in Zoom credential scams

    Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users.

    Luckily, INKY was on the case. Read this article to find out how they fought back against these fake Zoom phishing scams and more.

Find more content like what you just read:

  • Ward off phishing attacks with computer vision

    View this guide to learn how INKY uses visual analysis to figure out important features of each incoming email and matches it with other information to ward off phishing attacks.


  • How one company mitigated phishing and fraud attacks against senior staff

    Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.


  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.


  • Market trends: The Future of E-mail

    Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.


  • Expert ways to maximize security in Exchange

    This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.


  • Creating and Enforcing Email Security Policies

    This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.


  • Spotting hidden text and zero font attacks

    You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.


  • The DMARC, security awareness training, and more

    Dive into this report for the key findings from Mimecast’s 2021 state of email security survey on the DMARC standard, cybersecurity awareness training, the post-COVID threat landscape, and more.


  • Email Security Best Practices for Email Security as a Service

    In this expert e-guide, you will discover email security best practices for email security as a service and how to establish them in your organization.


  • Email security awareness training

    It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.


  • eGuide: Email Security and Compliance Best Practices

    Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.


  • Email security: 13 threats to keep an eye on

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.


  • Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.


  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.


  • Phishing tricks: Text direction deception

    Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.


  • Six Email Security Best Practices for Email SaaS

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.


  • Phishing: How to block spam, malware & zero-day exploits

    The truth is that the best-looking phishing emails are the most dangerous – especially when the threat actor replicates a perfect HTML copy of a real organization’s email with a very small tweak. Download this white paper to learn how INKY’s cloud-based email security offering aims to block spam, malware and phishing attacks.


  • How to prevent phishing attacks: User awareness and training

    This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.


  • The definitive email security strategy guide

    With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).


  • Improving Enterprise Email Security: Systems and Tips

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.


  • CEO impersonation: Inside BEC attacks

    Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.


  • Email security threats – have you experienced spear phishing?

    Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.


  • Compliance: Key considerations when migrating to Office 365

    In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.


  • 3-step playbook for responding to phishing attacks

    Despite spam filters, scheduled updates, web filters, employee training, and encryption policies, 9% of email reaching users is malicious, according to a recent report. Download this white paper to learn about the following 3 major steps to responding to phishing attacks.


  • Phishing: 2 new swimming scams

    Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.


  • Phishing: Imitating the government

    It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.


  • Understanding Phishing: Invisible characters

    Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.


  • Secure your Microsoft 365 email

    If your organization uses Microsoft 365 email, is it sufficiently prepared to handle advanced email threats and attacks? Dive into this white paper to explore the security challenges facing companies that rely on Microsoft 365 for email and learn recommendations for mitigating these risks.


  • Phishing guide: How to prevent account takeovers

    One of the most damaging forms of phishing involves account takeover. In these attacks a bad actor harvests the password for an email account, and then uses this account to impersonate a person that can often have devastating results.Download this white paper to learn how INKY uses machine learning capabilities to combat email phishing threats.


  • Spear-phishing: Top threats & trends Vol. 5

    As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.


  • IT Decision Checklist: Messaging Security

    Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.


  • How to stop BEC & EAC: A CISO’s guide

    Gartner predicts that business email compromise (BEC) attacks will double each year, totaling $5 billion in actual losses by 2023. So, how should CISOs protect their organizations against this growing threat? Download this exclusive e-book for insight into BEC and email account compromise (EAC) trends, challenges and best practices.


  • The hidden costs of free

    As organizations opt for third-party email platforms, like Microsoft 365, it becomes increasingly critical that they ensure security is up to snuff. Unfortunately, Microsoft 365’s native security features may not be best-fit for every user. Read this e-guide to learn more about how to make the most out of Microsoft 365.


  • Phishing: The Adobe Spark RFP scam

    Beginning in January 2021, several INKY users began receiving emails with fake RFPs. These supposed RFPs came from recipients’ legitimate contacts that had been compromised by bad actors. In this case, phishers were staging their forays from Adobe Spark, a cloud-based design application. Read this case study to see how they did it.


  • Protect against evolving email threats

    In today’s environment, traditional email security solutions aren’t enough to protect businesses anymore. With this e-book, discover the 13 top email threats, including their risks, impact on businesses, and how machine learning and API-based inbox defense can address the gaps in the email gateway and provide total email protection against attacks.


  • Email signatures: How to increase productivity & efficiency

    Synchronizing email signatures across your organization can be a major pain point. But since email is so widely used in today’s remote, hybrid and on-premises work force, it’s essential to maintain brand consistency. Download this white paper to learn how to design an email signature, how to scale within your organization and more.


  • 15 enterprise email security vendors, compared

    Email security market revealed that secure email gateways (SEGs) are slowly becoming dinosaurs as customers turn to the native security capabilities of the cloud. This Forrester report shows how each of the 15 providers measures up and helps security and risk professionals select the right one for their needs.


  • Prevent fraud with email risk scoring

    According to Statista, mail usage is predicted to grow by 2-3% each year, with over 92% of emails on corporate networks being personal. But as email usage grows, so too do the cyberthreats targeting user inboxes. Take this short survey to unlock a white paper highlighting the role of email risk scoring in fraud prevention.


  • BEC & EAC: Who’s behind the mask?

    The FBI has recognized business email compromise (BEC) and email account compromise (EAC) as one of the most pervasive and costliest cyberthreats in circulation. In fact, the average attack nets the attacker nearly $130,000. To learn more about BEC and EAC and how to prevent it, read this e-book.


  • Email security: How platform integration improves strategy

    Access this white paper from Gartner to learn how to build a pervasive email security strategy through platform integration. This guide contains sections on platform integration, using AI for phishing defense, cloud strategy, market research, and more.


  • 9 DDoS threats to watch for

    Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.


  • Energy group reduces email incident response times

    Parkmead Group operates in the energy sector – one singled out as a potentially lucrative target by threat actors. The Group faced limited IT manpower, ineffective email threat detection and time-consuming incident response times. View this case study to learn how Barracuda’s Total Email Protection helped solve these challenges.


  • The Microsoft table logo impersonation scam

    In January 2021, we began to see a new phishing technique that featured cleverly constructed emails infused with an HTML table impersonating the Microsoft logo. This Inky Technology report, The Microsoft Table Logo Impersonation Scam, analyzes this most recent discovery. Read on to learn more.


  • Phishing statistics: What an attack costs your business

    There has been a 64.4% increase in data breaches over the past 6 years, and many of these breaches start with a phishing attack. Open this blog to dive into the statistics of phishing and what you need to know about phishing and email security.


  • 7 key benefits of email inbox security for real estate

    Of all the cyber threats facing real estate companies, phishing emails pose the highest risk due to its role in facilitating high-value financial transaction. Download this case study to learn how Cyren’s inbox security combines inbox scanning with real-time threat intelligence and user reporting aims to protect agents and customers.


  • 46-pg eBook: How phishing changed during the pandemic

    Phishing remains a popular method of stealing credentials, committing fraud, and distributing malware. Access this report to learn how fraudsters are building and hosting their phishing sites, the tactics they use to remain hidden, and how you can protect your business.


  • Twenty Six Office 365 Security Pain Points – How to Relieve Them

    Many Office 365 users do not know where their Office 365-specific security vulnerabilities lie, or even that they exist. Download this e-book to learn about 26 Office 365 security pain points and how to relieve the discomfort they can bring.


  • Phishing: Fake COVID-19 vaccine form

    In one of the most recent phishing campaigns to hit INKY customers, bad actors sent emails that spoofed recipients’ human resources (HR) department, requiring them to submit fake COVID-19 vaccination forms. Read this article for a recap of the attackers’ techniques and best practices for defending against similar attacks.


  • Phishing: The Crime that Keeps on Taking

    As phishing variants continue to emerge, legacy anti-phishing software sometimes fails to detect them, especially when it comes to “Microjacking” – hijacking another's Microsoft’s resources to host phishing attacks. This blog post provides a closer look at how Microjacking attacks operate – read on to get started.


  • Advanced phishing protection: Analyst perspective

    When it comes to selecting a third-party email security solution, it’s hard to know what you can and can’t believe. The sheer number of self-proclaimed phishing experts makes for murky waters. Read this blog post featuring two 451 research analysts discussing 10 ways INKY is a cut above the rest for phishing protection.


  • Top COVID-19 phishing scams

    Phishing scammers have taken advantage of the frequent updates regarding COVID-19 information to use it as an entry point for their campaigns. This article, Top COVID-19 Phishing Scams, looks at the emerging threat types and what to look for to identify an attack – read on to get started.