IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Email

RSS Feed   
Secure Email Reports
 
3 Indicators to Monitor for Business Email Compromise (BEC)
sponsored by CI Security
WHITE PAPER: Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

CI Security

The Sunshine Laws, Freedom of Information and Compliance
sponsored by Egress Software Technologies Inc
CASE STUDY: Learn how you can use Egress to minimize response time to information requests and avoid a costly violation.
Posted: 21 May 2020 | Published: 21 May 2020

Egress Software Technologies Inc

DTEX and Phishing
sponsored by Dtex
CASE STUDY: Phishing shows no signs of slowing down. It’s responsible for more than 90% of incidents and data breaches driven by social engineering, with 66% of malware reportedly installed via malicious email attachments. Vigilance is key. View this case study to find out how DTEX was able to help an energy company locate the origin of a phishing attack.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Dtex

Spear Phishing: The Targeted Attacks that Aim for Your Business
sponsored by Vade Secure
WHITE PAPER: Phishing and spear phishing are two of the most common types of cyberattacks. In a growing digital economy, technological assets are coming under greater threat from these two very similar attacks. How do you identify a phishing attack, and how can you take a proactive approach? Read this white paper to learn the answers.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Tax Scammers: Gone Phishing This Tax Season
sponsored by Farsight Security
WHITE PAPER: Each tax season, thousands of Americans are scammed out of millions of dollars. In fact, according to an FTC report, nearly 1 in 10 people were victims of imposter scams last year, amounting to roughly $667 million lost. The following white paper highlights common tax scams to watch out for (according to the IRS) and how to prepare for them.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

Farsight Security

How to Spot a Spear Phishing Email
sponsored by Vade Secure
RESOURCE: The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


Web Security Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Mimecast

Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky Lab
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020

Kaspersky Lab
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info