Blog

Blog

99% of User-Related Threats Are Email Impersonation Attempts

Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating individuals,...
Blog

How Data Classification Helps Organizations Maintain a Strong Data Security Posture

The rise of globally dispersed workforces and new work from home requirements are placing extraordinary pressure on every organization’s cybersecurity. And wherever there is upheaval, so cyber criminals thrive. Alongside the devastating health and economic impacts of the coronavirus pandemic, we have also seen an escalation in cyber-attacks. A recent CISO/CIO survey, looking at cybersecurity...
Blog

Five Ways to Secure Data Within the Defense Supply Chain

Unsurprisingly the defense industry requires the most secure information sharing environment in the world, but what implications does this have for ensuring the effective mitigation of cyber risks? There is something of a paradox between the need for complete information governance in the defense sector and the rise of IoT, BYOD, cloud computing and the democratization of data in today’s blurred...
Blog

Prevent Supply Chain Cybersecurity Attacks with Safer Data Sharing

When considering cybersecurity policies and risk management, protection from phishing, ransomware, and other Advanced Persistent Threats (APTs) are usually top of mind. Data loss protection usually makes the list as well. However, one area of risk that can be overlooked is supply chain cybersecurity attacks. Trusted partners are vital to organizations but the cyber risks they pose can be just as...
Blog

Stop Cyber Attacks Before They Start: Data Harvesting and Targeting

The Greek philosopher Plato wrote that “the beginning is the most important part of the work.” The great American statesman, scientist, and philosopher Benjamin Franklin similarly emphasized the importance of planning when he stated that “by failing to prepare, you are preparing to fail.”It is unfortunate that many cybercriminals heed their advice today. The number of threats continues to increase...
Blog

The Not-So-Hidden Dangers of Hidden Data

Odds are, files and documents in your organization are not sitting in a folder on a desk or in a filing cabinet in the office. On the contrary, they are sitting on the cloud or computer desktop, and they are being transferred over email. The convenience of sending documents quickly with a few clicks has transformed the speed of business. But, like all things digital, convenience comes with risks....
Blog

Gone Phishing: What’s the Best Way to Educate Staff on Security?

How do you work out the weakest link in your team? Who is that employee most likely to fall prey to the socially engineered scams that are making billions of pounds for cyber criminals on the black market?Pertinent questions in the aftermath of the recent Kaspersky Lab report that revealed more than 100 banks, financial institutions and e-payment systems in over 30 countries had been targeted by...
Blog

The Seven Deadly Sins of Cybersecurity

Knowing what your employees are up to, enables you to strengthen your security policies. We all make mistakes at work from time to time. And sometimes we do things we know we shouldn’t. In the fast paced modern world, it’s easy enough to send an email to the wrong person or end up taking company information home. Often the consequences will be a bit of embarrassment, but every now and again they...
Blog

Do You Have a Sensitive Data Protection Checklist?

Data breaches and data loss, including the loss of sensitive information, are scary scenarios, and while no one can guarantee a cyberattack will not happen, there are ways to protect your organization’s data. We take a look at the top five tips for protecting your sensitive data.
Blog

Phishing with Invisible Ink

You might remember as a child, there was a revelation…invisible ink. Stepping forward to today, there is now a new type of phishing which uses invisible ink, or as it’s also called, ‘zero font’, as a means to beat the spam and phishing filters. Anti-spam / phishing filters work in several different ways; they look for specific words or phrases and there is then a statistical element. If there are 100,000 instances of the same message, it’s probably spam.
Blog

Best Practice Steps for Safe Data Sharing

Digital data is everywhere, you only have to look at how much data is transmitted over the internet on a weekly, daily, hourly, or even second-by-second basis to understand just how much data is being shared.
Blog

Top 5 Cybersecurity Threats to the UK Healthcare Sector

The sheer volume and complexity of data held within the UK healthcare sector makes it a challenge from a cybersecurity perspective to keep secure. In fact, research from a survey we conducted recently revealed that 67% of healthcare organizations in the UK have suffered a cybersecurity incident over the last 12 months.With the introduction of new data regulations and new technologies across the...
Blog

What Is an Enterprise’s Secondary Line of Defense Against Phishing Emails?

Following a multi-layered approach to phishing defense is a good idea, but using what you have close to home is best when it comes to a sensible security posture. In practice, a robust security awareness training program is key to instruct employees on what to look for when trying to spot phishing emails that may have landed in their inboxes.
Blog

Emails Reported as Malicious Reach Four-Quarter High in Q3

The volume of malicious emails reported in corporate inboxes has reached a four-quarter high, according to the latest data from Fortra's PhishLabs.
Blog

What Is Email Phishing? Protect Your Enterprise

Phishing emails can steal sensitive data and cost companies' their reputation. However, protecting a company from these scammers doesn't need to be difficult. What Is Email Phishing? Phishing is when an attacker mimics a trusted person or brand in an attempt to steal sensitive information, or gain a foothold inside a company network. While phishing emails are by far the most popular, these...
Blog

How to Neutralize the Rising Threat of Ransomware

In IBM's "Cost of a Data Breach 2022" report, the average payout for ransom was $812,360. The steady payout incline suggests that ransomware remains big business for cyber criminals, particularly as successful execution means easy money without the need for malicious actors to worry about exfiltration of the data they have stolen. On top of this, the tools for a ransomware attack are becoming...