Catherine Young

Recent Posts

Are You Getting Phishing Attacks in Outlook?

Posted by Catherine Young

Phishing attacks are the number one cyber threat facing organizations today. Don’t take our word for it. The World Economic Forum (WEF) interviewed 12,000 business executives about the biggest risks to doing business and they cited cyber-attacks as the top concern in advanced economies.

Read More

Topics: phishing attack

Office 365 Doesn't Give Phishing Email Notifications Without INKY

Posted by Catherine Young

The University of Iowa email system handles more than 2.5 million incoming email messages every day. Nearly 70 percent of them are spam, scams, or phishing emails. The amount of deceptive and dangerous email that is sent daily to organizations is staggering.

Read More

Topics: anti-phishing solution

"There's Something I Need You to Do for Me": INKY Stops CEO Impersonation Emails

Posted by Catherine Young

Why does the Gift Card Scam slip through most anti-phishing software solutions?

Because most anti-phishing software only analyzes attachments or scans for suspicious links in an email. Gift Card Scam emails are dangerous because they do not have attachments or even links to click — they simply look like emails from someone important in an organization asking for help, but are actually from a cybercriminal. 

Read More

Topics: spear phishing, email fraud

Why Savvy MSSPs Partner with INKY

Posted by Catherine Young

Interview with Carlene Shores, INKY VP of Sales

Read More

How to Prevent Phishing Attacks

Posted by Catherine Young

Whether you know it or not, your organization is under constant attack.  Cyber criminals are bombarding companies with phishing emails to steal data, money, and more.

Read More

Topics: phishing

Why You Need an Anti-Phishing Solution

Posted by Catherine Young

If bulk email phishing attacks are like a shotgun approach, spear phishing is like a rifle shot.  Unlike sending out bulk phishing emails, hackers target a specific person in spear phishing.  The attackers might gather information about that target, using social engineering strategies, and combing through company and publicly available documents.  They tailor the spear phishing email for that specific target.

Read More

Topics: anti-phishing solution

How to Protect Your Company from Spear Phishing Attacks

Posted by Catherine Young

A study of CISOs done by Raytheon and the Ponemon Institute produced some sobering results. Researchers asked CISOs to assess their stress level today versus three years from now on a scale of 1 to 10 with 10 being high stress.  The group expected their stress levels to be at an average of 8.8, the highest recorded.

Read More

Topics: phishing attack

What Is Your Organization Doing to Address Email Security?

Posted by Catherine Young

Email phishing attacks continue to be the most prevalent way cyber criminals are stealing credentials, launching malware, and breaching computer networks.  Email is almost always the point of entry.  The FBI calls these attempts Business Email Compromise (BEC) and they account for more than a billion dollars in losses for U.S. businesses each year.

Read More

Topics: email security

Don't Forget This Office 365 Tool

Posted by Catherine Young

The Problem with Microsoft Attack Simulator and Phishing

Microsoft recommends Office 365 admins buy an add-on subscription and run a program called Attack Simulator as a safeguard against phishing email attacks.  The company says Attack Simulator will run your employees through realistic scenarios that scammers use to steal credentials through email phishing schemes.

Read More

Topics: office 365 tools

INKY Is the Easiest and Most Cost-Effective Way to Protect Your Company's Email

Posted by Catherine Young

Microsoft Office 365 is under attack from scammers. This puts your business at major risk if you aren’t protected. 

Read More

Common Office 365 Email Security Issue: Phishing

Posted by Catherine Young

It sits there in your inbox daring you to click on it.  It appears to be an important message from the folks at Microsoft’s Office 365 email security team.  Either your mailbox storage is full, there is an important security notice you need to read, or your mailbox is about to be deleted and you need to act to prevent it from happening.  It looks legitimate, but it is just a phishing attempt to try to get your login credentials or launch some malware.

Read More

Topics: phishing

Office 365 – Phishing Weaknesses You Must Solve in 2019

Posted by Catherine Young

Microsoft, makers of Office 365, reports they see more than 5 billion threats detected on devices every month.  That represents more than 100 million unique phishing emails targeting Office 365 users annually.  There is no reason to believe that will end anytime soon.

Read More

Topics: phishing

The Anatomy of a Spear Phishing Email and What You Can Do About It

Posted by Catherine Young

Email is nearly ubiquitous in the workplace. It is one of the most durable and effective forms of communication.  It is also exceptionally vulnerable to attacks. While it may be easy to spot the fake emails from the British lawyer or Nigerian prince wanting to give you millions, today’s hackers are sophisticated and targeted.

Read More

Topics: spear phishing, phishing solution

Mimecast & Proofpoint Don't Stop Phishing Emails: What You Can Do About It

Posted by Catherine Young

It's every internet security professional’s nightmare scenario. A phishing email has gotten past your anti-email phishing software and someone's clicked on it. Whether it's malware, ransomware, or something worse, your reputation and maybe even your job may be on the line.

Read More

Topics: phishing emails

Inky's Catch of the Day: PhishPal

Posted by Catherine Young

Inky Phish Fence works 365/24/7. It never sleeps and never stops, it learns in perpetuity and today’s Catch of the Day is a testament to its robustness... Read on: 

Read More

Topics: what is phishing, phishing email examples