RSS feed Get our RSS feed

News by Topic

business email compromise

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: Apr 28, 2017
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected
Tags : security, threat and vulnerability management, security, cyber attacks, email, threat detection
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
     Proofpoint
By: Proofpoint     Published Date: Aug 21, 2017
Bei BEC-Attacken werden häufig CFOs oder Mitarbeiter der Personal- bzw. Finanzabteilung oder der Lohnbuchhaltung gezielt angegriffen. Mit einer als „Spoofing“ bezeichneten Methode werden die Opfer getäuscht und davon überzeugt, dass die erhaltene E-Mail von ihrem Vorgesetzten, einem Kollegen, einem Lieferanten oder einem Geschäftspartner stammt. Der Betrüger fordert den Empfänger zur Tätigung einer Überweisung oder zur Weitergabe von Steuerunterlagen oder anderer vertraulicher Daten auf.
Tags : geschäftsführer, chief financial officer, personalabteilung, finanzabteilung, lohnbuchhaltung
     Proofpoint
By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
     FireEye
By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : cyberthreat, healthcare, gdpr, ransomware
     Mimecast
By: Cyren     Published Date: Jan 30, 2017
A Survey of the State of Ransomware, Phishing, and Business Email Compromise. Download now to learn more.
Tags : 
     Cyren
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics