Phishing Research
-
Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
Sponsored by: ComputerWeekly.comLast year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
-
Driving Real Behaviour Change
Sponsored by: ProofpointThere are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
-
Why are Acronis Cyber Protection Solutions Threatagnostic?
Sponsored by: AcronisSecurity professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
-
Understanding Phishing: Computer Vision
Sponsored by: Inky TechnologyView this guide to learn how INKY uses visual analysis to figure out important features of each incoming email and matches it with other information to ward off phishing attacks.
-
The Top 25 Most Phished Brands
Sponsored by: Inky TechnologyThe stats are in! Uncover the top 25 most-phished brands during 2020, picked up by INKY’s tool, INKY Phish Fence.
-
Spear Phishing: Top Threats and Trends Vol. 5
Sponsored by: BarracudaAs their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.
-
Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
Sponsored by: BarracudaHealthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
-
Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
Sponsored by: BarracudaSpear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
-
Are your remote workers sitting ducks?
Sponsored by: MimecastCOVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
-
Insights into attacker activity in compromised email accounts
Sponsored by: BarracudaSpear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
-
Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
Sponsored by: BarracudaBusiness email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
-
13 email threat types to know about right now
Sponsored by: BarracudaAs email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
-
CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
Sponsored by: BarracudaTune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
-
Agile software testing pioneer slams the door on C-level email attacks
Sponsored by: BarracudaLearn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
-
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Sponsored by: BarracudaDownload this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
-
Spear Phishing: Top Threats and Trends Vol. 1
Sponsored by: BarracudaThis report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
-
MicroScope – December 2020: Reasons to be positive for 2021
Sponsored by: MicroScopeIn this issue, discover why the continued digital transformation trend means 2021 is looking good for the channel. Also read how business processes can be optimised by adding artificial intelligence to the mix, and how the channel is looking at the challenge of sustainability
-
MicroScope – November 2020: Simplify the path to partner programmes
Sponsored by: MicroScopeIn this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021
-
A Computer Weekly buyer's guide to Threat Management
Sponsored by: ComputerWeekly.comThreat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
-
Shore up your cybersecurity resilience: A guide for ANZ businesses
Sponsored by: ComputerWeekly.comIn this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
-
A Computer Weekly buyer's guide to Threat Management
Sponsored by: ComputerWeekly.comThreat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
-
Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
-
Remote Work Cybersecurity: Best Practices & Trends
Sponsored by: KasperskyThe COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
-
Create an Effective Email Phishing Test in 7 Steps
Sponsored by: Cisco UmbrellaThe best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
-
Why Businesses Need a More Enlightened Approach to Phishing Attacks
Sponsored by: PhishMeDiscover why your enterprise needs to take phishing seriously, 6 tactics these types of attacks utilize, how to teach your employees to recognize phishing, and security measures to take after an employee clicks on a malicious link.