Resources

Blog

What is a DMARC Policy?: The 3 Types, Which to Implement & Other Requirements

In this post, we’ll briefly explain what a DMARC policy is , how to set up your DMARC email record, what the three types of DMARC policies are and when to implement each one, and how to diagnose and fix any issues associated with it. Basically, your DMARC policy tells email receivers what to do with illegitimate or possibly fraudulent emails—whether to reject, quarantine, or accept them. Overall...
Article

BEC: Why This Basic Threat Is Difficult to Detect

Revenue lost to payment fraud saw an increase in every major global region from 2021 to 2022, and odds are your organization is still seeing email impersonation threats in inboxes. But why? This article provides insights on Business Email Compromise to help you understand just why these threats are so effective for cybercriminals.
Blog

The Science Behind the Scenes: How Machine Learning Combats Phishing Attacks and BEC

Because email remains the most ubiquitous form of business communication, it continues to be a favorite attack vector for cybercriminals. Email has always been vulnerable because it was not originally designed with security or privacy in mind. As a result, email security vendors emerged to protect this critical communication channel. In the early days, many vendors used signature or reputation...
Guide

Machine Learning Models in Cloud Email Protection

Traditional email security products struggle to detect email impersonation threats such as Business Email Compromise (BEC) and spear phishing campaigns. These threats consistently bypass defenses that rely on signatures and policies like Secure Email Gateways and native-cloud email filters. This guide breaks down how Fortra uses advanced data science, including machine learning models, to find and mitigate attacks that slip past traditional email defenses.
Blog

99% of User-Related Threats Are Email Impersonation Attempts

Threats in corporate inboxes hit new highs with a quarter of all reported emails classified as malicious or untrustworthy. 99% of these threats were email impersonation threats, such as BEC and credential theft lures, that lack attachments or URLs delivering malware payloads. Cybercriminals continue to bypass traditional email security tools and reach end users by impersonating individuals...
Video

Introduction to Fortra's Cloud Email Protection Platform

Even with Secure Email Gateways in place, deceptive attacks like BEC, targeted social engineering ploys, and spear phishing attempts can still get into user inboxes. In this video, Fortra’s Advanced Email Security experts discuss how Fortra’s Cloud Email Protection, a new integrated cloud email security platform, delivers multi-faceted defense against advanced email threats, including:: How AI...
Video

QR Codes That Aren’t Cool – How to Defend Your Inbox from Quishing Attacks

Most organizations have security controls in place to inspect URLs in emails to prevent the risk of credential phishing and business email compromise (BEC) attacks. However, threat adversaries have pivoted their tactics in order to bypass security stacks. The QR code is now the carrier of choice for delivering these types of payloads via email. Is your organisation ready to tackle this new...
On-Demand Webinar

QR Codes That Aren't Cool Webinar

Threat adversaries have pivoted their credential phishing and BEC tactics in order to bypass security stacks. In this video, Fortra’s Advanced Email Security expert, Dr. Steve Jeffery, discusses how the QR code has become the carrier of choice for delivering payloads via email and what your organization needs to put in place to stop them. You’ll learn: How human and machine mitigations help ward...
On-Demand Webinar

DMARC Revisited: Email Authentication in 2024

Implementing DMARC is one of the simplest ways to prevent email spoofing and ensure consistent email deliverability. Agari DMARC Protection will lead you through a safe and efficient DMARC implementation with features that allow you to: Catalogue and authenticate all legitimate senders–both 3rd-party and internal Navigate past common authentication pitfalls Comply with today’s major email provider...
Blog

DMARC Quarantine vs. DMARC Reject: Which Should You Implement?

You did it! You can now take a quiz and accurately answer "What Is DMARC?"! Next you've generated your DMARC record, implemented your policy, and authenticated your email domains. DMARC is no easy feat in itself and now, after DNS requests, third-party conference calls and writing internal policies, you are ready...to enforce a stricter DMARC policy ! If your DMARC policy has been set to p=none...
Article

Effective Strategies for Protecting Against BEC

While BEC is incredibly simple and effective, it is not unstoppable. Organizations need to go beyond traditional email security measures to detect, block, and prevent email impersonations. Learn what steps need to be taken in order to combat BEC and protect your organization from this popular attack.
On-Demand Webinar

What's Making It Past Secure Email Gateways?

How frequently are advanced threats actually bypassing your email security controls? One of the greatest challenges to protecting end users from high impact email attacks is detecting identity deception. Fortra has conducted an analysis of real end user phishing reports to determine which advanced threat types evade common secure email gateways and the frequency which they occur to better...
On-Demand Webinar

Is Microsoft Email Security Enough?

As Microsoft’s security capabilities continue to evolve, many organizations are questioning how much they should rely on Microsoft for their email security needs. This video includes email security experts from Fortra discussing enterprise email security requirements and how Microsoft fits into an organization’s email security strategy and stack. Learn: • How to evaluate Microsoft’s role in your...
Blog

Are Cybersecurity and Data Protection Now Integral to Business Success?

A famous front cover of The Economist in 2017 declared that the 'world’s most valuable resource is no longer oil, but data.' The value of data has indeed increased significantly. Organizations rely on data and data analytics for almost every facet of their operations and use it to make insightful decisions to help move the business forward. Many have invested in the tools and solutions - AI, CRM...
Blog

How Data Classification Helps Organizations Maintain a Strong Data Security Posture

The rise of globally dispersed workforces and new work from home requirements are placing extraordinary pressure on every organization’s cybersecurity. And wherever there is upheaval, so cyber criminals thrive. Alongside the devastating health and economic impacts of the coronavirus pandemic, we have also seen an escalation in cyber-attacks. A recent CISO/CIO survey , looking at cybersecurity...
Blog

Five Ways to Secure Data Within the Defense Supply Chain

Unsurprisingly the defense industry requires the most secure information sharing environment in the world, but what implications does this have for ensuring the effective mitigation of cyber risks? There is something of a paradox between the need for complete information governance in the defense sector and the rise of IoT, BYOD, cloud computing and the democratization of data in today’s blurred...
Blog

Prevent Supply Chain Cybersecurity Attacks with Safer Data Sharing

When considering cybersecurity policies and risk management, protection from phishing, ransomware, and other Advanced Persistent Threats (APTs) are usually top of mind. Data loss protection usually makes the list as well. However, one area of risk that can be overlooked is supply chain cybersecurity attacks. Trusted partners are vital to organizations but the cyber risks they pose can be just as...
Blog

Stop Cyber Attacks Before They Start: Data Harvesting and Targeting

The Greek philosopher Plato wrote that “the beginning is the most important part of the work.” The great American statesman, scientist, and philosopher Benjamin Franklin similarly emphasized the importance of planning when he stated that “by failing to prepare, you are preparing to fail.” It is unfortunate that many cybercriminals heed their advice today. The number of threats continues to...