IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

e-Mail Fraud

RSS Feed   
e-Mail Fraud Reports
 
Example of a Cloud Ransomware Attack Video Presented by Spin Technology
sponsored by Spin Tech
VIDEO: As organizations continue to move their sensitive data to cloud environments, it should come as no surprise that hackers are altering their methods to improve the success rates of their ransomware campaigns. Watch this video to see how a seemingly simple phishing scheme leads to a cloud ransomware attack.
Posted: 22 Jun 2020 | Premiered: 01 Apr 2020

Spin Tech

Six-Step Guide to Email Security Best Practices
sponsored by Clearswift
WHITE PAPER: The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Clearswift

Successfully Scaling Cybersecurity for Remote Work: Protect Your People
sponsored by Forcepoint
RESOURCE: One of the key directives for today’s IT and security teams is to safeguard the users and data within their distributed environment and implement cyber defenses that can protect those users—regardless of their location or device. Read on to learn how to keep your remote workers secure against today’s internal and external threats.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

A Computer Weekly buyer's guide to Threat Management
sponsored by ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

ComputerWeekly.com

Best Practices for Implementing Security Awareness Training
sponsored by Mimecast
RESEARCH CONTENT: While technology-based solutions are critical for protecting an organization from attacks, a robust security awareness training program is also essential to provide a backstop. In this white paper, learn about the current state of security awareness training. Also learn about best practices to consider when developing a robust training program.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Mimecast

Endpoint Security: A White Paper
sponsored by Orange Business Services
WHITE PAPER: With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Web Security Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Mimecast

Using Farsight Passive DNS
sponsored by Farsight Security
WHITE PAPER: For a hacker, the efficiency and ease-of-use of DNS-related phishing attacks is second to none. In fact, one Verizon study found phishing to be the #1 cause of data breaches. Download this white paper to learn more about Farsight’s Passive DNS tool, which embraces NIST’s 4-phase incident response lifecycle to help you thwart DNS-related threats.
Posted: 15 Jun 2020 | Published: 31 Jul 2019

Farsight Security

How to Survive a Bank Robbery
sponsored by Splunk
WHITE PAPER: Today's organizations are plagued by a myriad of cyberthreats designed to target their sensitive data and disrupt their business operations. Is your organization prepared in the event of a cyberattack? This guide is designed to prepare you to survive the 10 most common threats. Read on to learn more.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Splunk

How to Help Prevent Increasingly Rampant Brand Exploitation
sponsored by Mimecast
WHITE PAPER: A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info