Email Security

Email Security Reports
Endpoint security: Hybrid work changes the game
sponsored by ComputerWeekly.com
EGUIDE: A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not.  In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.
Posted: 10 Dec 2021 | Published: 10 Dec 2021

ComputerWeekly.com

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 18 Nov 2021 | Published: 05 Jun 2020

Proofpoint

7 of the Biggest Phishing Scams of All Time
sponsored by Inky Technology
BLOG: Falling for a phishing attack isn’t just annoying—for some companies, phishing attacks can cost hundreds of millions of dollars and incalculable reputational damage. Read this short blog post to learn how 7 of the biggest phishing scams of all time happened and discover some strategies you can use to make sure you don’t join that ignominious list.
Posted: 12 Oct 2021 | Published: 12 Oct 2021

TOPICS:  Email Security
Inky Technology

INKY Computer Vision
sponsored by Inky Technology
VIDEO: MSPs need to know that they’re being protected from ransomware and other dangerous security threats that come from phishing emails. Watch this short video to learn how INKY’s computer vision technology helps identify even the most advanced of fake emails that would typically fool an end user.
Posted: 12 Oct 2021 | Premiered: 21 Mar 2021

Inky Technology

How a Ransomware Attack Unfolds
sponsored by Inky Technology
WHITE PAPER: As recent, high-profile attacks have highlighted, ransomware (often perpetrated via phishing) is a huge risk for MSPs worldwide. Access this INKY white paper to learn how phishing attacks play out, explore strategies you can use to fight them, and discover how INKY’s mathematical and behavioral models stop ransomware attacks before they happen.
Posted: 07 Oct 2021 | Published: 07 Oct 2021

Inky Technology

Why INKY for Managed Services?
sponsored by Inky Technology
WHITE PAPER: INKY, a cloud-based email security platform designed with MSPs in mind, offers simple but powerful protection that is easy to deploy and manage. Access this short white paper to learn what makes INKY’s security offering attractive to so many businesses.
Posted: 07 Oct 2021 | Published: 07 Oct 2021

Inky Technology

Which deployment model is right for me?
sponsored by Inky Technology
WHITE PAPER: While many businesses now offer API-based solutions to enhance email security, particularly aimed at phishing, these tactics aren’t always the best approach. Access this white paper to learn how inline email security differs from API-based security and discover why INKY thinks that their standard model works best for customers.
Posted: 06 Oct 2021 | Published: 06 Oct 2021

Inky Technology

Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.
Posted: 26 Apr 2021 | Published: 27 Apr 2021

ComputerWeekly.com

Securing the Enterprise in the COVID world
sponsored by Mimecast
EBOOK: Dive into this report for the key findings from Mimecast’s 2021 state of email security survey on the DMARC standard, cybersecurity awareness training, the post-COVID threat landscape, and more.
Posted: 23 Apr 2021 | Published: 23 Apr 2021

TOPICS:  Email Security
Mimecast

Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.
Posted: 16 Apr 2021 | Published: 20 Apr 2021

ComputerWeekly.com

Understanding Phishing: Banner Effectiveness
sponsored by Inky Technology
WHITE PAPER: Putting banners in email to alert recipients to the potential dangers lurking in messages can be a highly effective way to keep employees safe from phishing attacks. But for this to be effective, you have to know which emails to flag. View this white paper to learn how INKY’s Phish Fence determines which emails to warn users about.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

Inky Technology

Omdia Market Radar: Outbound Email Security
sponsored by Zivver
WHITE PAPER: When it comes to email security, organizations put their primary focus on potential threats coming in. And that’s fine, but outbound email security is arguably just as important. Browse this white paper to get a closer look at outbound email data protection, which focuses on building controls to offset risks from the insider threat.
Posted: 08 Feb 2021 | Published: 09 Dec 2020

Zivver

Top COVID-19 Phishing Scams
sponsored by Inky Technology
RESOURCE: Phishing scammers have taken advantage of the frequent updates regarding COVID-19 information to use it as an entry point for their campaigns. This article, Top COVID-19 Phishing Scams, looks at the emerging threat types and what to look for to identify an attack – read on to get started.
Posted: 08 Feb 2021 | Published: 06 Oct 2020

Inky Technology

Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
sponsored by Inky Technology
RESOURCE: Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
Posted: 08 Feb 2021 | Published: 05 Oct 2020

Inky Technology

Zoom & Doom: How INKY Unraveled A Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 08 Feb 2021 | Published: 02 Oct 2020

Inky Technology

Hidden Text and Zero Font Attacks
sponsored by Inky Technology
RESOURCE: You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.
Posted: 08 Feb 2021 | Published: 07 Oct 2020

Inky Technology

Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 08 Feb 2021 | Published: 06 Oct 2020

Inky Technology

CEO Impersonation
sponsored by Inky Technology
WHITE PAPER: Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 08 Feb 2021 | Published: 02 Oct 2020

Inky Technology

Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 08 Feb 2021 | Published: 30 Sep 2020

Inky Technology

Exploiting a Pandemic White House COVID-19 Phishing Scams
sponsored by Inky Technology
EBOOK: It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.
Posted: 08 Feb 2021 | Published: 29 Sep 2020

Inky Technology

Who will win the world's biggest cloud contract?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Aug 2019

ComputerWeekly.com

Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Prevent Fraud And Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organisations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of the DMARC standard.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Making It Safe for Your People to Work Remotely
sponsored by Forcepoint
EBOOK: Given the current global pandemic, organizations have had to rapidly enable large amounts of remote workers – without compromising productivity or security. In this eBook, Making It Safe for Your People to Work Remotely, discover the risks associated with remote work and how to effectively address them.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Forcepoint

Email is your go-to comms tool, so don't scrimp on securing it
sponsored by ComputerWeekly.com
EBOOK: In this e-guide we will explore some current trends and best practice for email security to help you ensure you're as prepared as possible for the next malicious email to hit your inbox, which it assuredly will.
Posted: 08 Feb 2022 | Published: 08 Feb 2022

ComputerWeekly.com