Email Security Blog

Nobody is Safe From Spear Phishing Attacks

Dec 18, 2018 5:06:35 PM / by Stephen Ferrell posted in phishing attempt, phishing attack, phishing emails, business reputation, phishing solution

0 Comments

 According to statista.com IT Security spending in 2018 in the United States alone will reach $66B - an incredible number.

Read More

Mimecast & Proofpoint Don't Stop Phishing Emails: What You Can Do About It

Nov 5, 2018 2:41:17 PM / by Catherine Young posted in phishing emails

0 Comments

It's every internet security professional’s nightmare scenario. A phishing email has gotten past your anti-email phishing software and someone's clicked on it. Whether it's malware, ransomware, or something worse, your reputation and maybe even your job may be on the line.

Read More

Phishing Extortion Scam - Bitcoin Blackmail Blocked

Oct 24, 2018 1:52:24 PM / by Stephen Ferrell posted in phishing attack, phishing emails, business reputation, phishing solution, phishing, phishing attempt, email scam

0 Comments

“I took a screenshot through the camera of your device, synchronizing with what you are watching... I think that you do not want all your contacts to get these files, right? If you are of the same opinion, then I think that $811 is quite a fair price to destroy the dirt I created.”

Read More

How Phishing Emails Have Become More Sophisticated and Who They Target

Sep 28, 2018 4:18:47 PM / by Catherine Young posted in phishing emails, phishing solution

0 Comments

Trends in Phishing Emails Hitting Businesses Today

In law enforcement circles, sophisticated email phishing schemes are known as "business email compromise." More commonly called CEO Fraud or CFO fraud, they are targeting C-suites executives with increasing effectiveness.

Read More

2018 Phishing Email Examples: Cyber Criminals Are Getting More Sophisticated

Sep 28, 2018 4:14:45 PM / by Catherine Young posted in phishing emails, phishing email examples

0 Comments

What is Phishing?

Phishing is an all too common cyber attack using deceptive emails, malware, and websites to gather personal information. Hackers use this tactic to gain access to business systems, con someone into clicking on a link that downloads malware, or trick someone into acting.

Read More