Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
In this week's Computer Weekly, the BBC faces in-depth scrutiny over its digital plans – we take a look at progress. Do you need to keep data forever? We examine the technologies behind infinite storage. And we find out about the digital transformation challenges in vehicle dealerships. Read the issue now.
Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Information security governance is a system that helps organize and direct dedicated security resources. It influences how goals are set and achieved, how cyber-risks are monitored and assessed, and how security performance is evaluated. Security governance also encompasses the history, structure, internal politics and culture of an organization.
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.