ComputerWeekly.com Research Library

Powered by Bitpipe.com

Phishing Research

  • Insights into attacker activity in compromised email accounts

    Sponsored by: Barracuda

    Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.

  • The State of Email Security 2020

    Sponsored by: Mimecast

    The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.

  • Phishing Factories Exploit Trust to Attack Businesses

    Sponsored by: Akamai Technologies

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • Phishing Factories and Economies: The Real Persistent Threat

    Sponsored by: Akamai Technologies

    A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.

  • SIG - Axcess Financial Customer Story

    Sponsored by: Cisco Umbrella

    In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.

  • Webinar - Defend Better and Respond Faster With Security That Works Together

    Sponsored by: Cisco Umbrella

    Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.

  • 2020 SonicWall Cyber Threat Report

    Sponsored by: SonicWall

    So far this year, intrusion attempts are up 19% to 2.3 trillion. IoT malware attacks are up 50%. And according to the FBI, daily cybercrimes have increased 75% since COVID-19 began. In reading this white paper, you will learn powerful statistics and trends, such as these, to make strong decisions in protecting your network and users.

  • Types of Phishing Attacks You Need to Know to Stay Safe

    Sponsored by: Webroot

    Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. It is now carried out via text, phone, and email. Knowing about the diverse set of today’s tactics can help people be more prepared. Read this white paper for 11 common phishing tactics you should know.

  • Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout

    It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.

  • CIO Insight: Why Mobile Threat Defense

    Sponsored by: Lookout

    According to a study from Lookout Inc., there was in a 37.1% increase in mobile phishing from Q4 of 2019 to Q1 of 2020. Statistics like this one solidify the need for mobile device security today. Tap into this data sheet to reveal more mobile threat stats from 2020.

  • Threat Intelligence Report: RSA Conference Edition 2020

    Sponsored by: Mimecast

    The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.

  • Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy

    Sponsored by: Mimecast

    Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.

  • Endpoint Security: A White Paper

    Sponsored by: Orange Business Services

    With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.

  • Web Security Technical Deep Dive

    Sponsored by: Mimecast

    In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.

  • Combating the Threat of Business Email Compromise

    Sponsored by: Mimecast

    According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.

  • How to Help Prevent Increasingly Rampant Brand Exploitation

    Sponsored by: Mimecast

    A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.

  • This Is Your Last Line of Defense. Are They Ready?

    Sponsored by: Mimecast

    Your employees are your last line of defense against security threats. Are they ready? In this infographic, learn how to increase your employees’ knowledge of basic security issues with Mimecast Awareness Training.

  • 3 Indicators to Monitor for Business Email Compromise (BEC)

    Sponsored by: CI Security

    Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.

  • Why Does Cybersecurity Training Fail?

    Sponsored by: Mimecast

    The Verizon 2018 Data Breach Investigations Report found that email attacks were the cause of 96% of data breach incidents. Despite this, 34% of employees don’t see the importance of security measures.The verdict is in: Cybersecurity training fails. Why? What can you do to fix it?Dive into this white paper to learn how to solve this major problem.

  • The State of Email Security 2020

    Sponsored by: Mimecast

    It is impossible to control who is threatening your business and why, but it is possible to know how to better defend from threats by becoming more knowledgeable about how other organizations are handling them. Find out which trends are most relevant to you. Dive into this infographic for data on threat resilience and cybersecurity preparedness.

  • 100 Days of Coronavirus (COVID-19)

    Sponsored by: Mimecast

    To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.

  • Defense in Depth: Closing the Gaps in Microsoft 365 Security

    Sponsored by: Mimecast

    While email platforms like Microsoft 365 offer native security features, their ability to address today’s email-based cyberattacks is often called into question. So, how prepared is your organization to stop these threats? Download this white paper to discover security challenges and recommendations for organizations using Microsoft 365.

  • Using Secure Email Gateway to enhance data security in Microsoft Office 365

    Sponsored by: Clearswift

    This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.

  • Key Cybersecurity ‘Windows’ You Need to Close

    Sponsored by: Verizon

    Just as small businesses often don't appreciate their overall cyber risk profile, they typically don't grasp exactly how cybercriminals are breaching their data stores through malware. This article indicates exactly which measures must be taken to effectively defend from cybersecurity threats.

  • Six-Step Guide to Email Security Best Practices

    Sponsored by: Clearswift

    The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.

Browse by Report Type: Phishing White Papers | Phishing Multimedia | Phishing IT Downloads

See more topics related to: Phishing

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.