To prevent damage from phishing attacks, organizations need to take a few simple but important steps to improve their email security posture. Follow these six strategies, and your email infrastructure will be far safer from phishing and business email compromise (BEC).
To detect and contain breaches faster, it’s become increasingly important to go beyond the typical malware detection capabilities and invest in the ability to detect and react to lateral movement within the environment. Lateral movement is a core piece of an attacker’s strategy once he’s gained a foothold within the environment. What three steps can you take to help stop lateral movement focus on security measures that minimize dwell time?
According to Verizon's 2019 Mobile Security Index report, two-thirds of organizations said they are less confident about the security of their mobile assets than other devices. Many of these breaches occur due to vulnerable devices, servers and applications that allow bad actors to gain access. Security breaches and the threat of compromise are a serious issue for organizations of all sizes.
Google says that Gmail blocks more than 100 million phishing emails per day. Now, Google is seeing 18 million daily malware and phishing emails related to COVID-19. This is in addition to more than 240 million COVID-related daily spam messages.
Due to COVID-19, there are more Americans conducting life online than ever before – over 70 percent are teleworking, and of that, 34 percent have been granted telework options who would otherwise not have had them – but 62 percent have signed up for new tools and platforms to work, study or play.
Barracuda researchers have seen a steady increase in the number of coronavirus or COVID-19-related spear-phishing attacks since January 2020, but they have observed a recent spike in this type of attack, up 667-percent since the end of February 2020.
Recently, the U.S. Attorney’s Office for the Western District of Louisiana and the Internal Revenue Service – Criminal Investigation (IRS-CI) cautioned taxpayers of the opportunity for criminals to steal economic impact payments through various means of deception.
This month in Security magazine, we highlight COVID-19 and infosec's response. How has the sudden shift to remote work changed the roles of CISOs and security teams? Also this month, we profile Justin Dolly, CSO at Sauce Labs, his view on infosec and building security teams. In addition, security experts discuss continuous monitoring, radicalism, quantum technology, endpoint security and more.