Email Security Research
-
Business email compromise prevention tips
Sponsored by: TechTarget ComputerWeekly.comIt's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
-
Infographic: Business email compromise red flags
Sponsored by: TechTarget ComputerWeekly.comBusiness Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
-
5 Years Wannacry Anniversary – Is Wannacry Still A Threat
Sponsored by: Integrity360Wannacry ransomware first gained notoriety in 2017 after a global attack that was seen in over 150 countries and in excess of 300,000 devices. Researchers believe the attack was enacted by state sponsored cyberterrorists. Read this paper to learn more about Wannacry, and whether it poses a threat to today’ enterpirses.
-
Endpoint security: Hybrid work changes the game
Sponsored by: TechTarget ComputerWeekly.comA scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not. In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.
-
Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.
-
Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.
-
Spear Phishing: Top Threats and Trends Vol. 5
Sponsored by: BarracudaAs their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.
-
Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
Sponsored by: BarracudaHealthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
-
Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
Sponsored by: BarracudaSpear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
-
Are your remote workers sitting ducks?
Sponsored by: MimecastCOVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
-
Insights into attacker activity in compromised email accounts
Sponsored by: BarracudaSpear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
-
Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
Sponsored by: BarracudaBusiness email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
-
13 email threat types to know about right now
Sponsored by: BarracudaAs email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
-
Securing Your Business During the COVID-19 Crisis
Sponsored by: BarracudaLike you, Barracuda is adjusting to having everybody working from home. That’s why they’ve created a new webinar that shares insights about the key security challenges that this change entails, and how to overcome them. View now to gain actionable insights about how to keep your business secure in this extraordinary time.
-
Protecting Business and Remote Workers from Covid-19 Email Threats
Sponsored by: BarracudaThe recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
-
Spear Phishing vol2: Top Threats and Trends. Email account takeover, Defending against lateral phishing
Sponsored by: BarracudaThis report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
-
Who will win the world's biggest cloud contract?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
-
Agile software testing pioneer slams the door on C-level email attacks
Sponsored by: BarracudaLearn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
-
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Sponsored by: BarracudaDownload this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
-
Spear Phishing: Top Threats and Trends Vol. 1
Sponsored by: BarracudaThis report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
-
Email is your go-to comms tool, so don't scrimp on securing it
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we will explore some current trends and best practice for email security to help you ensure you're as prepared as possible for the next malicious email to hit your inbox, which it assuredly will.
-
12 Essential Features of Advanced Endpoint Security Tools
Sponsored by: ClaranetEndpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
-
Remote Work Cybersecurity: Best Practices & Trends
Sponsored by: KasperskyThe COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
-
What secure email gateways can do for your enterprise
Sponsored by: TechTarget SecurityIt is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
-
Email Security: Never more important
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.