Catherine Young

Recent Posts

How to Protect Your Company from Spear Phishing Attacks

Posted by Catherine Young

A study of CISOs done by Raytheon and the Ponemon Institute produced some sobering results. Researchers asked CISOs to assess their stress level today versus three years from now on a scale of 1 to 10 with 10 being high stress.  The group expected their stress levels to be at an average of 8.8, the highest recorded.

Read More

Topics: phishing attack

What Is Your Organization Doing to Address Email Security?

Posted by Catherine Young

Email phishing attacks continue to be the most prevalent way cyber criminals are stealing credentials, launching malware, and breaching computer networks.  Email is almost always the point of entry.  The FBI calls these attempts Business Email Compromise (BEC) and they account for more than a billion dollars in losses for U.S. businesses each year.

Read More

Topics: email security

Don't Forget This Office 365 Tool

Posted by Catherine Young

The Problem with Microsoft Attack Simulator and Phishing

Microsoft recommends Office 365 admins buy an add-on subscription and run a program called Attack Simulator as a safeguard against phishing email attacks.  The company says Attack Simulator will run your employees through realistic scenarios that scammers use to steal credentials through email phishing schemes.

Read More

Topics: office 365 tools

INKY Is the Easiest and Most Cost-Effective Way to Protect Your Company's Email

Posted by Catherine Young

Microsoft Office 365 is under attack from scammers. This puts your business at major risk if you aren’t protected. 

Read More

Common Office 365 Email Security Issue: Phishing

Posted by Catherine Young

It sits there in your inbox daring you to click on it.  It appears to be an important message from the folks at Microsoft’s Office 365 email security team.  Either your mailbox storage is full, there is an important security notice you need to read, or your mailbox is about to be deleted and you need to act to prevent it from happening.  It looks legitimate, but it is just a phishing attempt to try to get your login credentials or launch some malware.

Read More

Topics: phishing

Office 365 – Phishing Weaknesses You Must Solve in 2019

Posted by Catherine Young

Microsoft, makers of Office 365, reports they see more than 5 billion threats detected on devices every month.  That represents more than 100 million unique phishing emails targeting Office 365 users annually.  There is no reason to believe that will end anytime soon.

Read More

Topics: phishing

The Anatomy of a Spear Phishing Email and What You Can Do About It

Posted by Catherine Young

Email is nearly ubiquitous in the workplace. It is one of the most durable and effective forms of communication.  It is also exceptionally vulnerable to attacks. While it may be easy to spot the fake emails from the British lawyer or Nigerian prince wanting to give you millions, today’s hackers are sophisticated and targeted.

Read More

Topics: spear phishing, phishing solution

Mimecast & Proofpoint Don't Stop Phishing Emails: What You Can Do About It

Posted by Catherine Young

It's every internet security professional’s nightmare scenario. A phishing email has gotten past your anti-email phishing software and someone's clicked on it. Whether it's malware, ransomware, or something worse, your reputation and maybe even your job may be on the line.

Read More

Topics: phishing emails

Inky's Catch of the Day: PhishPal

Posted by Catherine Young

Inky Phish Fence works 365/24/7. It never sleeps and never stops, it learns in perpetuity and today’s Catch of the Day is a testament to its robustness... Read on: 

Read More

Topics: what is phishing, phishing email examples

How Phishing Emails Have Become More Sophisticated and Who They Target

Posted by Catherine Young

Trends in Phishing Emails Hitting Businesses Today

In law enforcement circles, sophisticated email phishing schemes are known as "business email compromise." More commonly called CEO Fraud or CFO fraud, they are targeting C-suites executives with increasing effectiveness.

Read More

Topics: phishing solution, phishing emails

2018 Phishing Email Examples: Cyber Criminals Are Getting More Sophisticated

Posted by Catherine Young

What is Phishing?

Phishing is an all too common cyber attack using deceptive emails, malware, and websites to gather personal information. Hackers use this tactic to gain access to business systems, con someone into clicking on a link that downloads malware, or trick someone into acting.

Read More

Topics: phishing emails, phishing email examples

What is Spear Phishing?

Posted by Catherine Young

According to Statista, IT Security spending in 2018 in the United States alone will reach $66B  an incredible number.

Read More

Topics: what is phishing

Over Half of Workers get Emails that Pretend to be from their Boss

Posted by Catherine Young

 We obviously know that phishing is a threat, but even we were surprised to read that over 50% of respondents to a Lloyds Bank survey said they received phishing emails from scammers posing as their boss. This particular kind of phishing attack, known as “CEO Fraud”, can pay off when scammers convince junior employees to pay a fake invoice, or forward other valuable information to whom they believe is a top executive.  

CEO fraud is sophisticated from both technological and social angles. Receiving an email from a trusted, high-ranking contact doesn’t raise concerns, as these kinds of messages “feel normal.” Attackers rely on this misplaced trust and a worker’s desire to please the boss. Criminals can use social media or even out-of-office messages to understand the business structure of an organization. They can then craft fake emails and attempt to reach several people within an organization, hoping at least one of them falls for it.  

Read More

Topics: spear phishing, phishing, whaling

What is the Difference Between Phishing, Spear Phishing, and Whaling?

Posted by Catherine Young

Scammers are sending phishing, spear phishing, and whaling emails in record numbers. A recent Internet Threat Security Report shows that 1 out of every 131 emails contained some form of malware. The hackers are nothing if not proficient. 76% of businesses report being a victim of phishing attacks and the business costs are staggering.

Read More

Topics: spear phishing, phishing, whaling

Why You Should Protect Your Business from Phishing

Posted by Catherine Young

What is Phishing?

The most common types of cyber crimes defy the stereotype of a hacker writing code and breaching firewalls with sophisticated methods. In reality, their methods are fairly simple. They "phish" for a way into your system or to gain access to your personal information.

Read More

Topics: phishing, phishing solution, what is phishing, business reputation