Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
|
Are your remote workers sitting ducks?
sponsored by Mimecast
WHITE PAPER:
COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
Posted: 08 Feb 2021 | Published: 07 Oct 2020
|
|
|
Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER:
Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 08 Feb 2021 | Published: 31 Jul 2020
|
|
|
13 email threat types to know about right now
sponsored by Barracuda
RESOURCE:
As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 08 Feb 2021 | Published: 01 May 2020
|
|
|
Protecting Business and Remote Workers from Covid-19 Email Threats
sponsored by Barracuda
VIDEO:
The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 08 Feb 2021 | Premiered: 21 Apr 2020
|
|
|
Spear Phishing vol2: Top Threats and Trends. Email account takeover, Defending against lateral phishing
sponsored by Barracuda
WHITE PAPER:
This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
Posted: 08 Feb 2021 | Published: 11 Oct 2019
|
|
|
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER:
Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 08 Feb 2021 | Published: 30 Apr 2018
|
|
|
Spear Phishing: Top Threats and Trends Vol. 1
sponsored by Barracuda
RESOURCE:
This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 08 Feb 2021 | Published: 31 Mar 2019
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 30 Jul 2019 | Published: 30 Jul 2019
|
|
|
Email is your go-to comms tool, so don't scrimp on securing it
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this e-guide we will explore some current trends and best practice for email security to help you ensure you're as prepared as possible for the next malicious email to hit your inbox, which it assuredly will.
Posted: 08 Feb 2022 | Published: 08 Feb 2022
|
|
|
12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE:
Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020
|
|
|
Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky
EGUIDE:
The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020
|
|
|
Email Security: Never more important
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020
|
|
|
How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE:
A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017
|
|
|
How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE:
Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016
|
|
|
Squash Large Business Email Security Challenges
sponsored by Intermedia Net
EGUIDE:
If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016
|
|
|
Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE:
One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016
|
|
|
Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER:
This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014
|
|
|
Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER:
This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
|
|
|
Cisco Email Security
sponsored by Cisco
WHITE PAPER:
This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014
|
|
|
Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE:
This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014
|
|
|
Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER:
This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER:
This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013
|
|
|
Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER:
Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013
|
|