IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed   
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 

Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Social Engineering Reports
 
What Is Phishing
sponsored by Claranet
EGUIDE: More than a decade after its first appearance, phishing remains the most common and pervasive type of cyberattack – but what is phishing? Who is at risk? And what kinds of attack variants are there? For answers to these, and more, read this Phishing Educational Guide.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Combating the Threat of Business Email Compromise
sponsored by Mimecast
WHITE PAPER: According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

Cloud Email Needs Cloud Security
sponsored by Cisco
RESOURCE: 90% of breaches occur via email, and in today’s cloud-centric world, built-in email security may not be enough. In order to secure Microsoft 365 from threats inside and outside of your mailbox, businesses need to consider email security that’s built for the cloud. View this infographic to learn more and to discover another security opportunity.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

The Ultimate Balancing Act: Enabling Emerging Technologies. Ensuring Security
sponsored by Frontier Communications
RESOURCE: In order to defend against today’s fast-evolving threats, cybersecurity experts are recommending a multi-layered approach to network security that doesn’t prevent innovation. Read on to learn more about achieving this balancing act.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

Frontier Communications

Email Security for Microsoft 365
sponsored by Vade Secure
WHITE PAPER: Cybercriminals are using email to target the weakest link in an organization’s cybersecurity chain: humans. You may have enabled email security add-ons for Microsoft 365, but you’re not as safe as you think. Read this white paper to learn how to keep your email safe from phishing, spear phishing and zero-day attacks.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Fayolle Preempts Cyberattacks and Persistent Threats
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the story of Fayolle, a French engineering and construction company, as they partner with Malwarebytes to address the rise in cyberattacks as a result of a cloud environment transition. Download the study now to uncover Fayolle’s results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

DTEX and Phishing
sponsored by Dtex
CASE STUDY: Phishing shows no signs of slowing down. It’s responsible for more than 90% of incidents and data breaches driven by social engineering, with 66% of malware reportedly installed via malicious email attachments. Vigilance is key. View this case study to find out how DTEX was able to help an energy company locate the origin of a phishing attack.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Dtex

Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

ComputerWeekly.com

2020 SonicWall Cyber Threat Report
sponsored by SonicWall
WHITE PAPER: Each year is a constant struggle between cybercriminals attempting to conduct successful attacks and organizations defending their users and data. 2019 was a good year for organizations as malware attacks dropped by 6%. Read on to uncover key statistics and insights about last year’s cyberattack trends.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

MicroScope – November 2020: Simplify the path to partner programmes
sponsored by MicroScope
EZINE: In this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021
Posted: 05 Nov 2020 | Published: 06 Nov 2020

MicroScope
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info