Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER:
This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
Posted: 11 Oct 2019 | Published: 11 Oct 2019
|
|
|
Email Security vs. Email Privacy: What You Need to Know
sponsored by Inky Technology
RESOURCE:
Since it was first introduced, email has blown up into a business-critical communication tool. However, its popularity has led to an innumerable amount of cyberattacks over the years. In this blog post, explore the differences between email security and email privacy – and discover how to achieve both.
Posted: 30 Sep 2020 | Published: 30 Sep 2020
|
|
|
Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER:
Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020
|
|
|
The New Normal: Working from Home and Phishing Threats
sponsored by Inky Technology
RESOURCE:
It’s estimated that during the COVID-19 pandemic, close to 50% of the US workforce is remote – this massive and sudden transition towards remote work is known as the “new normal”. With this change in workplace comes a change in cyberthreats – with phishing being the most prominent. Read this blog post to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020
|
|
|
Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER:
Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019
|
|
|
Email Security Threat Report 2020
sponsored by Darktrace
WHITE PAPER:
Year after year, email remains one of the most lucrative vectors for cybercriminals, likely due to the growing limitations of traditional email security methods. Download this report for an breakdown of 4 key email threats and discover how a self-defending inbox can be implemented to stop attacks before they strike.
Posted: 17 Jun 2020 | Published: 17 Jun 2020
|
|
|
Are Your Remote Workers Sitting Ducks?
sponsored by Mimecast
WHITE PAPER:
COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organizations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020
|
|
|
Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER:
Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 12 Aug 2020 | Published: 31 Jul 2020
|
|
|
Improving Enterprise Email Security: Systems and Tips
sponsored by SearchSecurity.com
EGUIDE:
This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013
|
|
|
Cisco Email Security
sponsored by Cisco
WHITE PAPER:
This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014
|
|
|
|
|