The Problem With Phishing Simulators

Posted by Stephen Ferrell

We live in an evolved world, and work in environments shaped by the largesse’s of the robber barons and the victories of the labor movement. While there is much work to be done, the workplace of today is generally more civilized and equitable than it has ever been.   Sadly though, phishing attacks are on the rise and even the best trained employees often fall victim.

Read More

Topics: phishing simulator

Why Savvy MSSPs Partner with INKY

Posted by Catherine Young

Interview with Carlene Shores, INKY VP of Sales

Read More

How to Handle Email Fraud

Posted by Stephen Ferrell

In 2018 email fraud reached epic proportions both in terms of the sheer volume of fraud attempts and the staggering dollar amounts that businesses large and small are facing. Dealing with email fraud is a daily reality for email security professionals across all business verticals. The challenge, unique to email fraud as opposed to hacking and malware attempts is that every email user in an organization is a potential entry point for a successful phishing attack.

Read More

Topics: email fraud

Take the INKY Phishing Fitness Test

Posted by Stephen Ferrell

Ok… I am issuing you a challenge, after I count to three – start training! 1, 2, 3, go!

Read More

Topics: phishing solution

How to Prevent Phishing Attacks

Posted by Catherine Young

Whether you know it or not, your organization is under constant attack.  Cyber criminals are bombarding companies with phishing emails to steal data, money, and more.

Read More

Topics: phishing

Why You Need an Anti-Phishing Solution

Posted by Catherine Young

If bulk email phishing attacks are like a shotgun approach, spear phishing is like a rifle shot.  Unlike sending out bulk phishing emails, hackers target a specific person in spear phishing.  The attackers might gather information about that target, using social engineering strategies, and combing through company and publicly available documents.  They tailor the spear phishing email for that specific target.

Read More

Topics: anti-phishing solution

Two Tech Giants Lose over $100M to Phishing

Posted by Stephen Ferrell

If you are under the age of 90 there is a pretty good chance that you’ve been on Facebook or Google today, likely both. When we think of those names we think of big tech and if I were to poll your opinion as to how secure these tech titans are relative to say… email fraud, I’d guess you respond that they’d be at the top? I would have too – until I read this article in today’s New York Times.

Read More

Topics: business reputation, phishing email examples, phishing attack, domain spoofing

Catch of The Day Insuphishent Funds

Posted by Stephen Ferrell

How to Spot a Fraudulent Email 

How fraudulent is this email? Let us count the ways! It looks harmless and seems to be from your payroll company, kindly alerting you about insufficient funds. The email sender is “Intuit Payroll Services”, and the email bears the Intuit logo and company trademark notes. Maybe there is more information in the attachment... Wait, don’t open that! 

Read More

Topics: phishing attack, phishing attempt, catch of the day, email security

It Does No Good to Implement an Email Security Solution After An Attack

Posted by Stephen Ferrell

Before people put locks on doors - there was the day before people put locks on doors. ‘The day before’ likely ended up with more than a few household goods getting crated off down the street.

Read More

Topics: phishing attack, email security

How to Protect Your Company from Spear Phishing Attacks

Posted by Catherine Young

A study of CISOs done by Raytheon and the Ponemon Institute produced some sobering results. Researchers asked CISOs to assess their stress level today versus three years from now on a scale of 1 to 10 with 10 being high stress.  The group expected their stress levels to be at an average of 8.8, the highest recorded.

Read More

Topics: phishing attack

What Is Your Organization Doing to Address Email Security?

Posted by Catherine Young

Email phishing attacks continue to be the most prevalent way cyber criminals are stealing credentials, launching malware, and breaching computer networks.  Email is almost always the point of entry.  The FBI calls these attempts Business Email Compromise (BEC) and they account for more than a billion dollars in losses for U.S. businesses each year.

Read More

Topics: email security

The Best Phishing Trips of 2018

Posted by Stephen Ferrell

The past does not define our future, but it often predicts it. That’s why INKY is the perpetual student. She is in a constant cycle of learning, becoming more powerful with every email she reads and every phish she catches. 2018 was a banner year for INKY literally and figuratively. Our phish fence solution caught tens of thousands of phishing attempts, in some cases hours before they had been flagged by the phishing aggregators. We’ve filleted a few of our favorite 2018 phish for you because as sure as the ocean is blue the attacks of 2018 will return in 2019 repackaged, repurposed, and more conniving than ever. INKY is ready. Are you?

Read More

Topics: phishing email examples

Don't Forget This Office 365 Tool

Posted by Catherine Young

The Problem with Microsoft Attack Simulator and Phishing

Microsoft recommends Office 365 admins buy an add-on subscription and run a program called Attack Simulator as a safeguard against phishing email attacks.  The company says Attack Simulator will run your employees through realistic scenarios that scammers use to steal credentials through email phishing schemes.

Read More

Topics: office 365 tools

INKY Is the Easiest and Most Cost-Effective Way to Protect Your Company's Email

Posted by Catherine Young

Microsoft Office 365 is under attack from scammers. This puts your business at major risk if you aren’t protected. 

Read More

Catch of the Day: Today's Flavor is FedEx Tracking

Posted by Stephen Ferrell

Product placement in the movies and on TV has been with us from the early days. It used to be extremely overt and in your face. Much like phishing attacks, product placement has grown more covert. It’s still exists but is subtler by implanting itself in our subconscious and is cleverly woven into story lines and subplots without us knowing it’s there. Our subconscious is exactly where cyber criminals often set their phishing trap.

Read More

Topics: phishing email examples, phishing attempt, catch of the day, brand forgery