ComputerWeekly.com Research Library

Powered by Bitpipe.com

Phishing White Papers

  • How to Spot a Spear Phishing Email

    Sponsored by: Vade Secure

    The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.

  • Dunkirk Enhances Microsoft 365 Email Security with Vade Secure for Microsoft 365

    Sponsored by: Vade Secure

    The victim of targeted attacks, the city and urban community of Dunkirk sought to bolster their defenses against email-based cyberattacks. This case study provides an overview of Dunkirk’s selection criteria as well as the results of their email security project – read on to get started.

  • KVC Health Systems Eliminates Email Security Incidents with Vade Secure

    Sponsored by: Vade Secure

    In this case study, discover how KVC was able to address the growing concerns around phishing-related attacks and explore how their partnership with Vade Secure enabled them to protect the sensitive healthcare data of their staff and patients.

  • Learn How to Detect a Phishing Email

    Sponsored by: Vade Secure

    We’ve all come across a poor phishing attempt that was immediately obvious, but cybercriminals are crafty – some phishing emails are nearly indistinguishable from an authentic email. So, where should you look to spot a phishing attack? The following resource provides 7 key areas to look at – check it out.

  • The Ultimate Balancing Act: Enabling Emerging Technologies. Ensuring Security

    Sponsored by: Frontier Communications

    In order to defend against today’s fast-evolving threats, cybersecurity experts are recommending a multi-layered approach to network security that doesn’t prevent innovation. Read on to learn more about achieving this balancing act.

  • The Most Creative Fake Login Pages Against The Biggest Brands In Tech

    Sponsored by: Ironscales

    Take a look at the most creative fake login pages against the biggest brands in tech to see if you can spot if they’re phishing or real.

  • X-Force Threat Intelligence Index

    Sponsored by: IBM

    The X-Force team at IBM releases an annual report, known as the X-Force Threat Intelligence Index, which summarizes the key cybersecurity threats and trends observed over the past year. Read on to unlock the key findings and takeaways from this year’s comprehensive report.

  • DTEX and Phishing

    Sponsored by: Dtex

    Phishing shows no signs of slowing down. It’s responsible for more than 90% of incidents and data breaches driven by social engineering, with 66% of malware reportedly installed via malicious email attachments. Vigilance is key. View this case study to find out how DTEX was able to help an energy company locate the origin of a phishing attack.

  • Know your enemy: Protecting against the top threats of 2020

    Sponsored by: Cisco Umbrella

    In 2019, threat traffic increased by 50x – a trend expected to increase in 2020. To help you understand the top cybersecurity threats, Cisco Umbrella put together this helpful infographic. Read on for 2019 trends and 2020 predictions.

  • Insights into attacker activity in compromised email accounts

    Sponsored by: Barracuda

    Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.

  • The State of Email Security 2020

    Sponsored by: Mimecast

    The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.

  • Phishing Factories Exploit Trust to Attack Businesses

    Sponsored by: Akamai Technologies

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • SIG - Axcess Financial Customer Story

    Sponsored by: Cisco Umbrella

    In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.

  • 2020 SonicWall Cyber Threat Report

    Sponsored by: SonicWall

    So far this year, intrusion attempts are up 19% to 2.3 trillion. IoT malware attacks are up 50%. And according to the FBI, daily cybercrimes have increased 75% since COVID-19 began. In reading this white paper, you will learn powerful statistics and trends, such as these, to make strong decisions in protecting your network and users.

  • Types of Phishing Attacks You Need to Know to Stay Safe

    Sponsored by: Webroot

    Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. It is now carried out via text, phone, and email. Knowing about the diverse set of today’s tactics can help people be more prepared. Read this white paper for 11 common phishing tactics you should know.

  • Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout

    It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.

  • CIO Insight: Why Mobile Threat Defense

    Sponsored by: Lookout

    According to a study from Lookout Inc., there was in a 37.1% increase in mobile phishing from Q4 of 2019 to Q1 of 2020. Statistics like this one solidify the need for mobile device security today. Tap into this data sheet to reveal more mobile threat stats from 2020.

  • Threat Intelligence Report: RSA Conference Edition 2020

    Sponsored by: Mimecast

    The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.

  • Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy

    Sponsored by: Mimecast

    Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.

  • Endpoint Security: A White Paper

    Sponsored by: Orange Business Services

    With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.

  • Web Security Technical Deep Dive

    Sponsored by: Mimecast

    In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.

  • Combating the Threat of Business Email Compromise

    Sponsored by: Mimecast

    According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.

  • How to Help Prevent Increasingly Rampant Brand Exploitation

    Sponsored by: Mimecast

    A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.

  • This Is Your Last Line of Defense. Are They Ready?

    Sponsored by: Mimecast

    Your employees are your last line of defense against security threats. Are they ready? In this infographic, learn how to increase your employees’ knowledge of basic security issues with Mimecast Awareness Training.

  • 3 Indicators to Monitor for Business Email Compromise (BEC)

    Sponsored by: CI Security

    Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.

Browse by Report Type: Phishing White Papers | Phishing Multimedia | Phishing IT Downloads

See more topics related to: Phishing

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.