CEO fraud has ruined the careers of many executives and loyal employees. It is responsible for over $3 billion in losses and has victimized more than 22,000 organizations.
Don't be next. The CEO Fraud Prevention Manual provides a thorough overview of how executives are compromised, how to prevent such an attack...
A six-month coordinated global law enforcement effort to crack down on business email compromise schemes has resulted in 74 arrests, the U.S. Department of Justice announced Monday.
File-less malware is a huge security challenge for organizations today, and traditional email security controls aren't sufficient to meet the challenge. It's time for a new approach email security.
The big issue is: The malicious payloads shift so much. It's really easy to do 100 variants of the same malicious...
A consistent message throughout this Summit: Most threats to an organization continue to enter through the route of least resistance - email. In this session, hear directly from a CISO on why email security needs renewed focus and how he's addressed it in his own organization, including:
Why smart employees continue...
Late last year in Australia, cybercriminals began targeting a fertile yet relatively poorly protected business sector for so-called business email compromise scams: the real estate industry. One expert says the industry, highly dependent on email, is ill-prepared for the attacks.
Business email compromise and account takeover attacks haven't faded; they've just morphed. Attacks are trending away from the old, static form and moving towards bypassing security controls and using social engineering techniques to ensnare victims.
Download this whitepaper on this new wave of attacks and learn...
This report uses healthcare-specific data to explore how medical staff and other end users in this industry are performing on cybersecurity assessments. We analyze responses gathered via nearly 85 million questions asked and answered in our Security Education Platform, as well as data culled from tens of millions of...
File-less malware is a huge security challenge for organizations today, and traditional email security controls aren't sufficient to meet the challenge. Burke Long of Lastline offers insight on a new way to approach email security.
What are the latest trends in BEC attacks? Does your organization have the security controls and resources in place to defend against them?
Download this report featuring exclusive BEC research and learn:
Which malicious emails bypass traditional email security protocols;
What a typical organization sending BEC...
Phishing is one of the most devastating threats hitting organizations every day. It's the most dangerous and costly cyber threat across the globe. Just one successful phishing attempt against your employees provides the foothold that cyber criminals need to access your entire corporate network.
A joint study...
Employees at Mesa Systems, a residential, commercial and logistics-based transportation solutions provider, were being tricked with highly sophisticated spear phishing emails causing much confusion in the workplace and a ton of overhead for the IT Department. So what did they do?
This case study reviews how Mesa...
Phishing attacks continue in 2018 to be very successful, regardless of all of the training employees have received. Threatening every organization around the world, attackers consider phishing a go-to technique to gain access to the network because it yields great success. With limited IT staff, budget constraints and...
Business email compromise and account takeover attacks haven't faded; they've just morphed. Wes Dobry of Agari discusses the new wave of these attacks and how organizations can do a better job of detecting and responding to them.
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
The U.S. Federal Government wants its agencies to modernize their IT systems, primarily by maximizing the use of cloud platforms. But IT teams are finding this transformation challenging. Investing in IT modernization can lead to more agility, improved resilience and security and, in the long term, better citizen...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.