Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Phishing scammers have taken advantage of the frequent updates regarding COVID-19 information to use it as an entry point for their campaigns. This article, Top COVID-19 Phishing Scams, looks at the emerging threat types and what to look for to identify an attack – read on to get started.
2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
In this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021
This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.