Email Threats Reports

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Danger within: email and security awareness training strategies for effective account takeover protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

Mimecast

Who will win the world's biggest cloud contract?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Aug 2019

TechTarget ComputerWeekly.com

Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Computer Weekly – 24 October 2017: Where will AI take us?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
Posted: 08 Feb 2021 | Published: 24 Oct 2017

TechTarget ComputerWeekly.com

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

TechTarget Security

Email Security Best Practices for Email Security as a Service
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, you will discover email security best practices for email security as a service and how to establish them in your organization.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

TechTarget Security

Improving Enterprise Email Security: Systems and Tips
sponsored by TechTarget Security
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

TechTarget Security

Advanced cybersecurity fraud and how to fight it
sponsored by TechTarget Security
EBOOK: Fraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

TechTarget Security

What secure email gateways can do for your enterprise
sponsored by TechTarget Security
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

TechTarget Security

Email Security: Never more important
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
Posted: 22 Nov 2019 | Published: 21 May 2018

Cisco Umbrella

The Best Email Security Comes Through Strategy and Tactics
sponsored by TechTarget Security
EBOOK: Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

TechTarget Security

Crunching the Costs of Microsoft Exchange On-premises vs. Cloud Services
sponsored by Riverbed Technology, Inc.
EGUIDE: Download this expert guide to learn how to calculate the costs of on-premises Exchange versus those of Office 365's mail service, and from this assessment deduce if the O365 cloud is your enterprise's best option for collaboration. Discover new cost factors such as electricity, bandwidth needs, personnel expenses, and more.
Posted: 28 Nov 2016 | Published: 22 Nov 2016

Riverbed Technology, Inc.

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Squash Large Business Email Security Challenges
sponsored by Intermedia Net
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia Net

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Improve Enterprise Email Systems with HP Messaging Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.
Posted: 04 Sep 2014 | Published: 30 Apr 2013

Hewlett-Packard Enterprise

Consultants: How Can You Secure Your Information with Customers?
sponsored by Globalscape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

Globalscape

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by Globalscape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

Globalscape

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky

Email Security Technical Guide
sponsored by TechTarget Security
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

TechTarget Security