IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed   
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 

Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Social Engineering Reports
 
Protecting Against the Top 5 Attack Vectors
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Recently, there has been an abundance of cyberattacks in the news with popular companies, such as Uber and Equifax. Explore this resource to uncover how to protect against the top 5 attack vectors.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

TRU Cyber Tales: Stopping Phishing Attacks Dead in their Tracks
sponsored by eSentire
WEBCAST: Download this on-demand webinar to learn what eSentire’s Threat Response Unit (TRU) team is doing to stop phishing attacks dead in their tracks. Get real-world examples of phishing attacks contained by their Security Operations Center (SOC) and discuss how organizations can better protect themselves from phishing attacks in the future.
Posted: 19 Feb 2021 | Premiered: Feb 19, 2021

TOPICS:  Phishing
eSentire

Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy
sponsored by Mimecast
WHITE PAPER: Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

How Cyberattackers Are Exploiting COVID-19 to Undermine Your Security
sponsored by Fidelis
PODCAST: Since widespread information about COVID-19 first surfaced back at the beginning of the year, there has been a reported uptick of phishing, ransomware and misinformation campaigns designed to prey on people’s fears. Listen to this webcast for insight into attacker objectives and tactics – including specific examples.
Posted: 19 Aug 2020 | Premiered: Aug 19, 2020

Fidelis

How to Help Prevent Increasingly Rampant Brand Exploitation
sponsored by Mimecast
WHITE PAPER: A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

2020 Remote Workforce Security Report
sponsored by Okta
RESEARCH CONTENT: Enabling and securing a remote work posed significant challenges to the IT teams responsible. This research report highlights those specific challenges – from internal operational hurdles to external threats – as well as impacts that went beyond security. Read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Okta

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

SIG - Axcess Financial Customer Story
sponsored by Cisco Umbrella
CASE STUDY: In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Cisco Umbrella

Global Phishing Pandemic? You Be the Judge.
sponsored by Inky Technology
RESOURCE: Since the start of the COVID-19 health crisis, complaints to the FBI’s Internet Crime Complaint Center (IC3) have more than tripled. Why are there so many of these coronavirus-related email phishing threats and where are they coming from? View this article to get a link to a free report of COVID-19 phishing examples around the world.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology

Why Does Cybersecurity Training Fail?
sponsored by Mimecast
WHITE PAPER: The Verizon 2018 Data Breach Investigations Report found that email attacks were the cause of 96% of data breach incidents. Despite this, 34% of employees don’t see the importance of security measures.The verdict is in: Cybersecurity training fails. Why? What can you do to fix it?Dive into this white paper to learn how to solve this major problem.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Mimecast
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info