Email Threats Research
-
Business email compromise prevention tips
Sponsored by: TechTarget ComputerWeekly.comIt's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
-
Infographic: Business email compromise red flags
Sponsored by: TechTarget ComputerWeekly.comBusiness Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
-
Danger within: email and security awareness training strategies for effective account takeover protection
Sponsored by: MimecastIt’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
-
Who will win the world's biggest cloud contract?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
-
Email security: Never more important
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
-
Computer Weekly – 24 October 2017: Where will AI take us?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
-
Webmail Forensics: Investigating Issues with Email Forwarding Security
Sponsored by: TechTarget SecurityIn this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.
-
Email Security Best Practices for Email Security as a Service
Sponsored by: TechTarget SecurityIn this expert e-guide, you will discover email security best practices for email security as a service and how to establish them in your organization.
-
Improving Enterprise Email Security: Systems and Tips
Sponsored by: TechTarget SecurityThis expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
-
Advanced cybersecurity fraud and how to fight it
Sponsored by: TechTarget SecurityFraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.
-
What secure email gateways can do for your enterprise
Sponsored by: TechTarget SecurityIt is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
-
Email Security: Never more important
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
-
Create an Effective Email Phishing Test in 7 Steps
Sponsored by: Cisco UmbrellaThe best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
-
The Best Email Security Comes Through Strategy and Tactics
Sponsored by: TechTarget SecurityAchieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
-
Crunching the Costs of Microsoft Exchange On-premises vs. Cloud Services
Sponsored by: Riverbed Technology, Inc.Download this expert guide to learn how to calculate the costs of on-premises Exchange versus those of Office 365's mail service, and from this assessment deduce if the O365 cloud is your enterprise's best option for collaboration. Discover new cost factors such as electricity, bandwidth needs, personnel expenses, and more.
-
How Global Threat Intelligence Fits into a Security Strategy
Sponsored by: IBMBefore considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
-
Squash Large Business Email Security Challenges
Sponsored by: Intermedia NetIf you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
-
Secure Mobile Email for the Lean IT Department
Sponsored by: Shavlik TechnologiesThis expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
-
Improve Enterprise Email Systems with HP Messaging Services
Sponsored by: Hewlett-Packard EnterpriseFind out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.
-
Consultants: How Can You Secure Your Information with Customers?
Sponsored by: GlobalscapeThis case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
-
Mitigating Email Virus Attacks
Sponsored by: CiscoThis exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
-
Mitigating Email Virus Attacks
Sponsored by: CiscoAccess this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
-
Discover How Mail Express Solves 2 of Your Biggest IT Headaches
Sponsored by: GlobalscapeMail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
-
Webmail Forensics: Investigating Issues with Email Forwarding Security
Sponsored by: KasperskyThis expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
-
Email Security Technical Guide
Sponsored by: TechTarget SecurityCheck out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.