Business email compromise (BEC), also known as email fraud, is one of cybersecurity’s costliest and least understood threats. As BEC schemes have evolved, industry nomenclature has outlived its usefulness. Without a framework to describe and break down BEC attacks—let alone conceptualize them—researching and...
People are leaving their jobs in droves during the "Great Resignation," and the cybersecurity industry is not immune to the trend. Mike Hamilton, the former CISO for the city of Seattle, warns organizations about the opportunities this presents for cybercriminals and outlines how employers can work to retain talent....
While SEGs (Secure Email Gateways) may claim to protect emails from all possible threats, they unwittingly send infected emails to users, just waiting for them to act. Since the invention of email, phishing has evolved continuously, and hackers have been finding
new ways to infiltrate users’ inboxes and trick...
DMARC, SPF, and DKIM are global anti-domain-spoofing standards, which can significantly cut down on phishing attacks. Implemented correctly they allow you to monitor email traffic, quarantine suspicious emails, and reject unauthorized emails. But less than 30% of organizations are actually using them. And even fewer...
As cloud email security implementations become more popular, security and risk management professionals are taking an in-depth look at their capabilities. Cloud-based security solutions deployed through APIs instead of a gateway are easier to implement and provide more comprehensive protection.
To find out how to...
Looking to learn how to leverage Enterprise Email Security Solutions? This overview will help!
Download now to discover how to:
Intercept and block phishing attacks;
Avoid costly business email compromise (BEC) attacks;
Enhance security team efficiency
Initiate and preserve trusted communications
In the financial services sector, email correspondence may contain sensitive personal or legal information, and it’s often critical that this information be actioned within a strict deadline. For your brand to succeed, your clients must be able to trust you with the integrity of their confidential data — this...
Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple.
In this session, Javvad Malik, Lead Security Awareness Advocate for KnowBe4, will explain how to take your security awareness to the next level and prevent it from going...
Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by bad actors? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your...
As ransomware attacks continue to dominate headlines, Quentyn Taylor, a Canon director of information security, cautions organizations not to forget about "some of the other threats, like business email compromise," which continue to cripple organizations through financial and reputational damage.
Organized networks continue leveraging specific threat vectors to successfully target key customer interaction points. Balancing convenience and safety across the customer journey begins with dynamic interaction and behavior intelligence. Is your current fraud strategy designed to keep pace?
Our ebook details...
The U.S. Attorney's Office for the Eastern District of Virginia last week indicted three men - including an ex-employee of Bank of America and TD Bank - with money laundering and aggravated identity theft after the men allegedly conducted an extensive business email compromise scheme.
Yes, you know they are coming. And yes, the fraudsters have raised their game. But that doesn't mean you can't stop socially engineered attacks before threat actors can pull off their scams. Mike Britton of Abnormal Security tells you how.
The scary fact is that human error is a contributing factor in more than 90% of breaches, and even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses. With so many technical controls in place hackers are still getting through to your end users, making them your last...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.