ComputerWeekly.com Research Library

Powered by Bitpipe.com

Phishing Research

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Sponsored by: ComputerWeekly.com

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

  • Driving Real Behaviour Change

    Sponsored by: Proofpoint

    There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.

  • Why are Acronis Cyber Protection Solutions Threatagnostic?

    Sponsored by: Acronis

    Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.

  • Understanding Phishing: Computer Vision

    Sponsored by: Inky Technology

    View this guide to learn how INKY uses visual analysis to figure out important features of each incoming email and matches it with other information to ward off phishing attacks.

  • The Top 25 Most Phished Brands

    Sponsored by: Inky Technology

    The stats are in! Uncover the top 25 most-phished brands during 2020, picked up by INKY’s tool, INKY Phish Fence.

  • Spear Phishing: Top Threats and Trends Vol. 5

    Sponsored by: Barracuda

    As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.

  • Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”

    Sponsored by: Barracuda

    Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.

  • Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.

    Sponsored by: Barracuda

    Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.

  • Are your remote workers sitting ducks?

    Sponsored by: Mimecast

    COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.

  • Insights into attacker activity in compromised email accounts

    Sponsored by: Barracuda

    Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.

  • Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks

    Sponsored by: Barracuda

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

  • 13 email threat types to know about right now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Agile software testing pioneer slams the door on C-level email attacks

    Sponsored by: Barracuda

    Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.

  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

    Sponsored by: Barracuda

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

  • Spear Phishing: Top Threats and Trends Vol. 1

    Sponsored by: Barracuda

    This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.

  • MicroScope – December 2020: Reasons to be positive for 2021

    Sponsored by: MicroScope

    In this issue, discover why the continued digital transformation trend means 2021 is looking good for the channel. Also read how business processes can be optimised by adding artificial intelligence to the mix, and how the channel is looking at the challenge of sustainability

  • MicroScope – November 2020: Simplify the path to partner programmes

    Sponsored by: MicroScope

    In this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

  • Remote Work Cybersecurity: Best Practices & Trends

    Sponsored by: Kaspersky

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.

  • Why Businesses Need a More Enlightened Approach to Phishing Attacks

    Sponsored by: PhishMe

    Discover why your enterprise needs to take phishing seriously, 6 tactics these types of attacks utilize, how to teach your employees to recognize phishing, and security measures to take after an employee clicks on a malicious link.

Browse by Report Type: Phishing White Papers | Phishing Multimedia | Phishing IT Downloads

See more topics related to: Phishing

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.