IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Email Threats

RSS Feed   
ALSO CALLED: Threats
DEFINITION: Vulnerabilities in an email message.
Email Threats Reports
26 - 50 of 92 Matches Previous Page  |  Next Page
Danger Within: Email and Security Awareness Training Strategies for Effective Account Takeover Protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

DTEX and Phishing
sponsored by Dtex
CASE STUDY: Phishing shows no signs of slowing down. It’s responsible for more than 90% of incidents and data breaches driven by social engineering, with 66% of malware reportedly installed via malicious email attachments. Vigilance is key. View this case study to find out how DTEX was able to help an energy company locate the origin of a phishing attack.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Dtex

Phishing Factories Exploit Trust to Attack Businesses
sponsored by Akamai Technologies
RESOURCE: As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

Akamai Technologies

Webinar - Defend Better and Respond Faster With Security That Works Together
sponsored by Cisco Umbrella
WEBCAST: Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.
Posted: 31 Jul 2020 | Premiered: Jul 14, 2020

Cisco Umbrella

Endpoint Security: A White Paper
sponsored by Orange Business Services
WHITE PAPER: With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Web Security Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Mimecast

Lessons in Threat Detection
sponsored by Orange Business Services
WHITE PAPER: The UK’s 2018 Cyber Security Breaches Survey found that 43% of businesses had experienced a cybersecurity breach in the last 12 months.With threats on the horizon, some businesses have decided that the best way to learn about their security is to hack… themselves?Jump into this white paper to see what one organization learned from doing so.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Combating the Threat of Business Email Compromise
sponsored by Mimecast
WHITE PAPER: According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

Cyber Resilience for Email
sponsored by Mimecast
WHITE PAPER: Did you know that 91% of all cyberattacks start with an email?In the world today, businesses are struggling to keep up with hackers. They need an approach that provides holistic protection, is adaptable and durable, and allows them to recover their data in the event of an attack.Read this white paper for a close look at one such approach.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

The State of Email Security 2020
sponsored by Mimecast
RESOURCE: It is impossible to control who is threatening your business and why, but it is possible to know how to better defend from threats by becoming more knowledgeable about how other organizations are handling them. Find out which trends are most relevant to you. Dive into this infographic for data on threat resilience and cybersecurity preparedness.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Mimecast

You've Got BEC!
sponsored by Proofpoint
EBOOK: BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Proofpoint

Protecting Your Business from Cyberthreats in 2020
sponsored by Barracuda
EBOOK: Modern hackers have taken traditional methods of cyberattack and altered them to become more precise, more aggressive, and more dangerous. The FBI reported that business email compromise attacks cost organizations $26 billion in the past three years, and this number may be due to increase. Learn more about evolving threats in this e-book.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Barracuda

2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

The 10 Biggest & Boldest Business Email Compromise Scams of 2020 and 2019
sponsored by Proofpoint
EBOOK: Business email compromise (BEC) is a growing threat continues to plague inboxes, stealing billions of dollars across industries of all sizes. In this e-book, Proofpoint provides a look at 10 of the biggest, boldest and most interesting business email compromise scams across 2019 and 2020. Read on to get started.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Proofpoint

Barracuda Essentials Overview
sponsored by Barracuda
VIDEO: In this short video, learn how you can protect your business from advanced email threats like ransomware, phishing, and data loss with Barracuda Essentials.
Posted: 22 Apr 2020 | Premiered: 22 Apr 2020

Barracuda

Trend Micro Maximizes Email and Server Protection for Leicester’s De Montfort University
sponsored by Trend Micro
CASE STUDY: Inside this case study, find out how De Montfort University integrated security capabilities across multiple players of their IT infrastructure, including email, mobile, endpoint, and web.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

Trend Micro

Email security: Never more important
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Dutch DIY Giant Shelves Email Attacks
sponsored by Barracuda
CASE STUDY: As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Barracuda

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Who will win the world's biggest cloud contract?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

ComputerWeekly.com

Email security: Never more important
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

Internal Threats Personified
sponsored by Mimecast
WHITE PAPER: When it comes to securing email and protecting against cyberattacks, most organizations focus their attention on inbound emails. Although this is a great start, not all attacks are from incoming emails. In this white paper, explore 4 email-related activities that employees often engage in that contribute to the spread of these insider threats.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

Mimecast

The Best Email Security Comes Through Strategy and Tactics
sponsored by SearchSecurity.com
EBOOK: Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

SearchSecurity.com

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
Posted: 22 Nov 2019 | Published: 21 May 2018

Cisco Umbrella
26 - 50 of 92 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info