Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » phishing

Articles Tagged with ''phishing''

ransomware

4 steps to tackling ransomware

jim boehm headshot.jpg
Jim Boehm
May 4, 2022

Cybersecurity professionals need to follow these four steps to mitigate the effects of ransomware: prevention, preparation, response and recovery.


Read More
email phishing

Retail sector named top target of phishing attacks

Security Staff
April 22, 2022

Retail organizations saw a 400% increase in phishing attacks, according to the 2022 ThreatLabz Phishing Report from Zscaler.



Read More
email security

Cybersecurity threats facing enterprise email accounts

Security Staff
April 21, 2022

An email security report from Cyren found common threats facing business email accounts at U.S. and U.K. organizations.


Read More
social-media-freepik1170x658.jpg

Social networks most likely to be imitated by criminal groups

Maria Henriquez
April 20, 2022

Social media networks have now overtaken shipping, retail and technology as the category most likely to be targeted by criminal groups, according to Check Point.


Read More
hacker data breach

Russia, US among most-breached countries in Q1 2022

Security Staff
April 14, 2022

Russian identities were breached to the highest level in Q1 2022, followed by the United States and Poland. A study from Surfshark examines data breach statistics in early 2022.



Read More
email-warning-freepik1170x658.jpg

1 in 4 employees who fell victim to cyberattacks lost their jobs

Security Staff
March 29, 2022

One in four employees lost their job in the last 12 months, after making a mistake that compromised their company’s security, according to new data by Tessian.


Read More
mobile-sec-freepik1170.jpg

Mobile zero-day security vulnerabilities, phishing attacks continue to rise

Phishing, malware, data breaches: Mobile devices are a moving target
Maria Henriquez
March 18, 2022

For teams looking to respond to evolving mobile security threats, the Zimperium 2022 Global Mobile Threat Report offers some insights. 


Read More
hacker scammer

$5.9 billion lost due to fraud in 2021

Madeline Lauver
March 2, 2022

Identity theft and imposter scams were some of the top fraud techniques employed by scammers to defraud users out of $5.9 billion in 2021, according to data from the Federal Trade Commission (FTC).


Read More
phishing

4 tips for launching a simulated phishing campaign

Ellen M. Sturgeon head shot1569363024691 (1).jpg
Ellen M. Sturgeon
March 2, 2022

A cybersecurity tactic to reduce ransomware and increase security awareness: simulated phishing campaigns. Here are four considerations for enterprise security leaders thinking about adopting the cyber defense technique.



Read More
phishing-freepik1170x658v4.jpg

5 tips for building a positive anti-phishing behavior management program

New Stu Sjouwerman CEO KnowBe4.jpg
Stu Sjouwerman
February 17, 2022

Five tips to help organizations create a positive anti-phishing behavior management program and six common mistakes to avoid.


Read More
Previous 1 2 … 16 17 18 19 20 21 22 23 24 … 32 33 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing