All resources sponsored by:

Inky Technology

13 Matches
Executive Report: Phishing by the Numbers
sponsored by Inky Technology
WHITE PAPER:View this report that breaks down some of the critical phishing attack statistics for the past year and reveals the 7 most common phishing themes to watch out for in 2020.
Posted: 16 Oct 2019 | Published: 16 Oct 2019
Get This Now


Understanding Phishing: Fake Attachments
sponsored by Inky Technology
WHITE PAPER:Malicious fake attachments are a trend that has security pros on the alert.So how can you spot them at first glance and before they do serious damage? This special phishing report for security pros reveals exactly how it’s done.
Posted: 16 Oct 2019 | Published: 16 Oct 2019
Get This Now


2019 Special Phishing Report
sponsored by Inky Technology
ANALYST REPORT:Just a single phishing attack can cost an organization hundreds of thousands, if not millions, of dollars. In this 2019 Special Phishing Report, discover how many phishing emails still breach the leading email protection systems, and why identifying and blocking these attacks still poses such a challenge.
Posted: 16 Jul 2019 | Published: 16 Jul 2019
Get This Now


2019 IT Guide: Securing Email
sponsored by Inky Technology
WHITE PAPER:Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.
Posted: 28 Jun 2019 | Published: 28 Jun 2019
Get This Now


The 6 Most Common Types of Phishing Attacks
sponsored by Inky Technology
WHITE PAPER:Phishing attacks are on the rise and attackers are constantly evolving their tactics to trick victims. In this white paper, explore 6 of the most common types of phishing attacks.
Posted: 28 Jun 2019 | Published: 28 Jun 2019
Get This Now


Understanding Phishing Attacks: Confusable Domains
sponsored by Inky Technology
WHITE PAPER:Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.
Posted: 28 Jun 2019 | Published: 28 Jun 2019
Get This Now


Reduce the Risk of Phishing Attacks on Your Company
sponsored by Inky Technology
RESOURCE:Every employee with an email address within your organization is a risk to your business. How those employees react to a phishing attempt can be critical to the success or destruction of your business. In this blog, learn how INKY Phish Fence can help reduce the risk of phishing attacks on your company.
Posted: 27 Jun 2019 | Published: 27 Jun 2019
Get This Now


Why Training Is Not Enough to Stop Phishing Emails
sponsored by Inky Technology
RESOURCE:According to the FBI, phishing-based email accounted for more than $12 billion in fraud in just the last 5 years. In this blog, learn how Inky Phish Fence can help your organization prevent phishing attacks by scanning every internal and external email.
Posted: 27 Jun 2019 | Published: 27 Jun 2019
Get This Now


Are You Getting Phishing Attacks in Outlook?
sponsored by Inky Technology
RESOURCE:IT security and infrastructure personnel are seeing a high volume of phishing attacks every day. This is why phishing alerts and anti-phishing software are so important. However, even if your organization uses phishing alerts in Outlook, they might not be solving the problem. In this blog, learn how INKY can help solve your phishing attack problem.
Posted: 26 Jun 2019 | Published: 26 Jun 2019
Get This Now


Spear Phishing Attacks: The #1 Cyberthreat
sponsored by Inky Technology
RESOURCE:Spear phishing is the most popular email fraud and scam method used today. In this blog, learn how a spear phishing attack works and how organizations can prevent it.
Posted: 26 Jun 2019 | Published: 26 Jun 2019
Get This Now


Common Office 365 Email Security Issue: Phishing
sponsored by Inky Technology
RESOURCE:Discover the common Office 365 email security attacks that have been infiltrating businesses emails.
Posted: 25 Jun 2019 | Published: 25 Jun 2019
Get This Now


How Spear Phishing Targets the C-Suite
sponsored by Inky Technology
RESOURCE:In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.
Posted: 24 Jun 2019 | Published: 24 Jun 2019
Get This Now


What Is Phishing and What Are Top CISOs Doing About It?
sponsored by Inky Technology
RESOURCE:In the last year, different types of phishing attacks have begun to emerge. One example is a wire transfer scam in which attackers steal money from companies after suggesting an overdue bill or unpaid invoice. Download this blog to explore different types of phishing attacks and see what businesses can do to prevent them.
Posted: 24 Jun 2019 | Published: 24 Jun 2019
Get This Now


13 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement