Part 2 of a 5-part series. In part 1, we explored the uncomfortable truth that no matter how good your perimeter controls, malicious emails still reach the inbox. While security technologies do a great job of telling us about the attacks they have stopped, they do a poor job of telling us about the threats they have let through. This segues nicely into: Uncomfortable … [Read more...] about Uncomfortable truth #2 about phishing defense
Features
Six phishing predictions infographic
In volume and complexity, phishing attacks are getting worse. Read why organizations expect AI to raise its anti-phishing game and also, take a look at the trend towards off-the-shelf malware (but don’t forget about custom varieties). Get ahead of the problem, download this eBook on phishing trends our experts anticipate. … [Read more...] about Six phishing predictions infographic
Uncomfortable truth #1 about phishing defense
Part 1 of a 5-part series. The threat posed by phishing is not new. For many years, the media and research papers have been littered with examples of data breaches that have been traced back to phishing attacks. Organizations have attempted to tackle the threat through investments in next-gen technologies and increased employee awareness training. … [Read more...] about Uncomfortable truth #1 about phishing defense
19 Minutes infographic
Imagine a cunning phisher: he knows his craft and sends your users an email appearing to come from your CEO that bypasses all your other technology. What would you do? A Cofense customer faced that very scenario and relied on Cofense Triage and the Cofense Phishing Defense Center (PDC) to analyze, respond to, and resolve the attack—in less than 20 minutes after it … [Read more...] about 19 Minutes infographic
Catching the elusive big phish – Part 2
Identifying and defeating the ubiquitous CEO Fraud phishing attacks isn’t easy. Sometimes it requires breaking lifelong habits. By Todd R. Weiss SECOND OF A TWO-PART SERIES In our first installment we looked at the basics of a business email compromise (BEC) attack, sometimes called CEO Fraud. Here we will delve deeper into what to do to stop such … [Read more...] about Catching the elusive big phish – Part 2