Resources

Case Study

Filling the Gaps in Microsoft 365

With a major spike in email attacks targeting their executives, discover how this cloud data management company turned to us for advanced threat protection with Fortra's Cloud Email Protection.
Blog

SMTPS: Securing SMTP and the Differences Between SSL, TLS, and the Ports They Use

What is the difference between SMTPS and SMTP? SMTPS uses additional SSL or TLS cryptographic protocols for improved security, and the extra "S" stands for SECURE! By default, SMTP to send email lacks encryption and can be used for sending without any protection in place, leaving emails with an SMTP setup susceptible to man-in-the-middle attacks and eavesdropping from bad actors while messages are...
Blog

5 Big Myths about DMARC, Debunked

With email attacks contributing to billions of lost dollars each year, a growing number of organizations are adopting Domain-based Message Authentication, Reporting & Conformance (DMARC) in an effort to protect themselves and their customers from fraudsters. Adoption of DMARC has steadily gained traction since the onset of the pandemic, and the original email authentication protocols at the heart...
Blog

Six Steps to Email Security Best Practice

To help IT teams define a robust email security policy and determine what’s required from an email security solution, we’ve put together a new six-step guide.
Press Release

Clearswift and Agari: Best Email Security Providers & Services 2022

Channel Insiders looks at considerations for Email Security Solutions and assesses the best providers and services in 2022. Originally published in Channel Insiders Excerpt: "On Gartner Peer Insights, Agari and Clearswift both hold an average score of 4.8 / 5 stars across a dozen reviews. Top client reviews mention the vendor service and support, contract flexibility, ease of implementation, and...
Blog

Common Phishing Email Attacks | Examples & Descriptions

What does a phishing email look like? We've compiled phishing email examples to help show what a spoofed email looks like to prevent against phishing attacks. Brand deception phishing is the most common example of phishing people will come across. Brand deception phishing occurs when an attacker mimics a trusted company in an email and asks someone for their personal information like credit card...
Blog

What Is Email Phishing? Protect Your Enterprise

Phishing emails can steal sensitive data and cost companies' their reputation. However, protecting a company from these scammers doesn't need to be difficult. What Is Email Phishing? Phishing is when an attacker mimics a trusted person or brand in an attempt to steal sensitive information, or gain a foothold inside a company network. While phishing emails are by far the most popular, these attacks...
Blog

It’s the Most Wonderful Time of the Year… for Cybercriminals

The holiday season is upon us, which means it’s also the busiest time of the year for online shopping. There’s Black Friday, Cyber Monday, and gifts to buy for loved ones. Plus, gifts to buy for yourself when the deals are this good! But beware, for cybercriminals ‘tis also the season to scam millions of dollars from unsuspecting people and companies. They’re banking on people being in a rush and...
Blog

How to Neutralize the Rising Threat of Ransomware

In IBM's "Cost of a Data Breach 2022" report, the average payout for ransom was $812,360. The steady payout incline suggests that ransomware remains big business for cyber criminals, particularly as successful execution means easy money without the need for malicious actors to worry about exfiltration of the data they have stolen. On top of this, the tools for a ransomware attack are becoming...
Blog

Spear Phishing Emails: What They Are & How to Prevent Them

Spear phishing is more focused than normal phishing. To protect against this type of phishing, your entire company will need to be educated and protected. What is a typical spear phishing attempt? A typical spear phishing attempt is a fraudulent personalized email that is usually sent with an attachment or requests a response. The fraudster then tries to entice the recipient to open the infected...
Press Release

Fortra Acquires PhishLabs to Continue Expansion of Cybersecurity Portfolio

Digital Risk Protection platform delivers curated threat intelligence and complete threat mitigation across digital risk landscape MINNEAPOLIS, October 19, 2021—Fortra announced today the acquisition of PhishLabs , a leading cyber threat intelligence company that protects organizations from attacks on their brands, employees, and digital assets. PhishLabs sources intelligence across the internet...
Blog

Why Supply Chains Are Today’s Fastest Growing Cybersecurity Threat

Business ecosystems have expanded over the years owing to the many benefits of diverse, interconnected supply chains, prompting organizations to pursue close, collaborative relationships with their suppliers. However, this has led to increased cyber threats when organizations expose their networks to their supply chain and it only takes one supplier to have cybersecurity vulnerabilities to bring a...
Blog

Internal Breaches: The Threat That’s Too Close to Home

There were 108.9 million accounts were breached in the third quarter of 2022. This is a 70% increase compared to the second quarter. However, despite a common belief that attacks mostly involve cyber espionage or are state-sponsored, our research found that 42% of security incidents actually come from inside the organization . Since the introduction of data protection laws, such as GDPR , it is...
Press Release

Agari by Fortra Supports Customer Ready to Embrace BIMI Email Security

MINNEAPOLIS ( July 15 , 2021) — Agari by Fortra , a market leader in phishing defense for the enterprise, today announced that its Agari Brand Protection solution for Domain Message Authentication Reporting & Conformance (DMARC) email authentication has been enhanced to help customers take advantage of Google’s newly launched support for BIMI in Gmail . BIMI—or Brand Indicators for Message...
Blog

TLS Email Encryption: What It Is & How to Check if Your Email Is Using It

What exactly is TLS when it comes to email encryption? TLS, or cybersecurity protocol Transport Layer Security first developed by the Internet Engineering Task Force (IETF), was designed to establish secure communications that provide both privacy and data security. Originally created from another encryption protocol called Secure Sockets Layer, or SSL, you may hear others use SSL and TLS...
Blog

How to Implement the BIMI-Selector Header for Multiple Brands

Wondering what Brand Indicators for Message Identification actually means? Here, we’ll cover the basics of BIMI, what the BIMI-selector header is, what it does, whether you need it, and how to implement it. But first, do you really need the BIMI-selector header? In most cases, you only need the BIMI-selector header if you want to support multiple logos for multiple brands or subdomains. Otherwise...