Phishing attacks & How to be safe from them.

Phishing

The history of phishing reveals that the first phishing email originated sometime around the year 1995. Though, then the attacks were not so exceptional but still did the trick. Phishing attacks are often initiated through email communication. The phishing mail includes generic greetings as well as target’s name, phone number and other details to make […]

Phishing attacks & How to be safe from them. Read More »

Global Security Trend: Email Attacks Shifting From Endpoints To People

Cyber Criminals Know Your Users Better Than You A shift is observed in the strategy of cyber attackers. The change is away from the enterprise perimeter and endpoints, and moving toward employees and key functional roles. Cyber Security Hub hosted a webinar with Proofpoint to discuss how your organization can stay one step ahead of

Global Security Trend: Email Attacks Shifting From Endpoints To People Read More »

Email Phishing Overshadows Risk Of Mobile Malware

Mobile Devices Demand Executive Diligence Mobile devices demand diligence at the CISO level. In fact, like the mobile device’s counterpart, workstations and laptops, many loaded malware campaigns begin with phishing attempts. One of the understated risks is that the mobile breach could allow for expansive lateral movement. Cyber Security Hub developed a market report to

Email Phishing Overshadows Risk Of Mobile Malware Read More »

Email Security: The Seismic Shift To Highly-Targeted Attacks

The really unfortunate situation faced by organizations today is that legacy email security solutions are being outpaced by a rapidly-changing threat landscape and a steep rise in targeted attacks. Email security isn’t foolproof either. And the solutions that organizations have deployed are no longer keeping up with the sophistication of attackers. The Not-So-Sincere Bakery Order

Email Security: The Seismic Shift To Highly-Targeted Attacks Read More »

The Biggest Email Security Challenge Facing Organizations Today

Email is the single most effective and commonplace way of reaching someone in the business world today. Even as other methods of digital communication have come and gone over its 40-year history, email remains the backbone of business communications with 3.7 billion users worldwide collectively sending 269 billion messages every day. But email’s ubiquity and

The Biggest Email Security Challenge Facing Organizations Today Read More »

Sharp Spike in Attacks Targeting Company Email Accounts

A new report by email and data security company Mimecast has revealed a staggering increase in the number of Business Email Compromise (BEC) cyber-attacks. The quarterly Email Security Risk Assessment (ESRA) report, released today, found a 269% increase in the number of BEC attacks in quarter three of 2019, compared to the second quarter of the year.  BEC attacks are

Sharp Spike in Attacks Targeting Company Email Accounts Read More »

WHERE DO AN ORGANIZATION STAND WHEN IT COMES TO EMAIL MANAGEMENT, E-DISCOVERY, EMAIL RETENTION, AND EMAIL COMPLIANCE [E3]?

Do you have in place an email policy that is clear, comprehensive, and current? In other words, has your email policy been reviewed and updated within the past 12 months? ____Yes ____No ____Don ‘t Know  2. Have you created an email retention policy to govern the retention and disposition of electronic business records and help

WHERE DO AN ORGANIZATION STAND WHEN IT COMES TO EMAIL MANAGEMENT, E-DISCOVERY, EMAIL RETENTION, AND EMAIL COMPLIANCE [E3]? Read More »

Hybrid setup in Email Services

Cloud computing has already made a huge impact on the IT industry. Being in the market for more than a decade, its true capabilities are only now beginning to be realized. Among the various services and platforms, Software as a Service (SaaS) is one of the most preferred among enterprises. Dominate the IT market with

Hybrid setup in Email Services Read More »