Your people are now the primary exploit target. You need to protect them, the way they work, and identify assets and risks before you are compromised. With an increasing amount of sensitive and confidential information- and an expanding attack surface of devices, cloud apps, and mobile locations- you cannot afford to...
The threat landscape is always shifting, and impostor emails are on the rise. Carefully planned and researched, impostor emails target specific people in your company. Either you become
the target of this attack or you become the unwitting victim.
Learn how Proofpoint Email Protection allows you to quickly see,...
Reliable metrics convey the robustness of phishing and spear phishing. They've been compiled
by the Anti-Phishing Working Group (APWG), the global coalition of tech vendors, government and law
enforcement agencies and NGOs focused on the problem.
In the first three quarters of 2015, the number of unique phishing...
Last year, the information security community witnessed some of the world's most devastating data breaches resulting from deadly malware strains and carefully executed phishing attacks. PhishMe's research team spent the last 12 months compiling the latest phishing intelligence and malware trends into an executive...
PhishMe has been collecting and aggregating phishing threat and simulation data since the launch of the Simulator service in 2008. With this report, we hope to share our experiences and insights on employee behavior as it relates to the simulated phishing attack scenarios.
Download this report for an inside look at...
Identifying phishing emails doesn't have to be complicated, as most phishing emails share common characteristics that savvy readers can recognize. This infographic provides an overview of those tell-tale signs of a phishing email.
Download this infographic to explore 3 brief lessons where you'll learn...
MedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.
Verizon Enterprise Solutions, which regularly assists clients in responding to their data breaches, admits it's suffered its own breach. The breach of contact information reportedly affected 1.5 million business customers, who now face greater risk of phishing attacks.
Ransomware attacks against hospitals are becoming commonplace this year, with at least five incidents revealed in recent weeks. What steps can organizations take to avoid falling victim to these attacks?
It has become accepted in many security
corners that "breach is inevitable." But Rohyt
Belani, CEO of PhishMe, rejects that notion.
Hear how he believes organizations should
be arming their employees to help fight back
against attackers.
Download this interview with Belani from the RSA Conference 2016 to...
Advanced attacks are out, while persistent, relatively simple attacks are in. Despite all of the APT hype in recent years, cybercriminals, and especially nation-state attackers, prefer to keep things simple. Information security experts explain why.
Spear phishing continues to pose an acute threat to any organization holding
what the cyber underground views as valuable data. We know this because spear phishing
continues to turn up as the trigger for massive network breaches, from Target and Sony
Pictures to Anthem and the U.S. Office of Personnel Management....
Spear phishing, well-crafted socially engineered wire-transfer schemes and mobile-app overlay attacks will continue to escalate, which is why anti-phishing education is becoming increasingly critical, Dave Jevans of the Anti-Phishing Working Group says in this video interview.
Webroot has just released its 2016 edition of its annual threat brief. In an exclusive interview, Michael Malloy, executive vice president of products and strategy, discusses the report and how its key findings will likely play out in the year ahead.
It has become accepted in many security corners that "breach is inevitable." But Rohyt Belani, CEO of PhishMe, rejects that notion. In this video, learn how he believes organizations should be arming their employees to help fight back against attackers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.