phishing

Results 226 - 250 of 251Sort Results By: Published Date | Title | Company Name
Published By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
    
OneNeck IT Services
Published By: Microworld     Published Date: Dec 12, 2007
At the Mail Gateway, MailScan for SMTP Servers scans and cleans mails that flow between all local users and mails between the Internet and Mail Server. It protects organizations against Viruses, Worms, Trojans, Backdoors and many other malware, blocks Spam and Phishing mails, while providing total Content Security for email traffic.
Tags : 
mailscan, mail scan, email security, filtering, filter, email filter, blocking, internet security, virus, spam, anti-virus, anti-spam, anti spam, anti virus, malware, microworld
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.
Tags : 
spam, email security, anti-spam, anti spam, email, intrusion prevention, mail scan, mailscan, email, phishing, filter, filtering, email filter, blocking, nilp, microworld
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
The Small and Medium Businesses contribute to around 68% of the world economy while making up for 80% of the employment. The security needs, issues and priorities of SMBs are different in many ways from that of large Business Houses.
Tags : 
smb, smbs, small business, soho, internet security, email security, spam, spamming, anti-spam, phishing, pharming, malware, trojan, trojans, anti-virus, virus, anti virus, spyware, anti-spyware, anti spyware
    
Microworld
Published By: CopiaTECH     Published Date: Mar 18, 2008
No longer worried about viruses, Trojan horses, worms, identity theft, and phishing scams? Do you feel as if you have gone the distance to protect your company and your network from impending doom? Sleep at night? Well, there is one tiny itty bitty little detail that can be a can of worms that makes a good old virus look quite friendly, the software license agreement.
Tags : 
license, end user, eula, copiatech, spyware, anti spyware, internet security
    
CopiaTECH
Published By: Trend Micro SaaS     Published Date: Oct 07, 2007
Der umfassende Hosted-Service wehrt Bedrohungen ab, ehe sie das Netzwerk erreichen, und kombiniert dazu leistungsfähige Anti-Spam- und Anti-Phishing-Funktionen mit mehrfach ausgezeichnetemViren- und Spyware-Schutz. Trend Micro, einer der Marktführer im Bereich der Sicherheits-Software, aktualisiert und optimiert die Lösung, um das Netzwerk des Kunden zuverlässig zu schützen und gleichzeitig wertvolle IT-Ressourcen einzusparen.
Tags : 
trend, messaging hosted security, e-mail, netzwerk, mx-datensatzes, spyware-schutz
    
Trend Micro SaaS
Published By: Symantec.cloud     Published Date: Jan 28, 2011
In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
symantec cloud, search engine link spam, messagelabs, viruses, trojans, spyware, phishing, url, universal resource locator, anti spam, anti spyware, anti virus, cloud computing
    
Symantec.cloud
Published By: VeriSign     Published Date: Feb 10, 2011
This paper reveals the latest advances in SSL technology and how these advances ensure your customers have confidence in the security of your site, as well as protecting them from threats such as phishing, data manipulation and other site scams.
Tags : 
verisign, ssl, security, phishing, data manipulation, threats, protection, secure sockets layer, anti spam, anti spyware, anti virus, security management, web service security
    
VeriSign
Published By: Keynectis     Published Date: Aug 03, 2011
Tips for safe purchasing on the Internet. Good practices. Dangers. What to avoid. Recommendations. How can SSL help.
Tags : 
ssl, phishing, piracy, internet, fraud, e-commerce
    
Keynectis
Published By: Symantec     Published Date: Jun 29, 2012
Extended Validation SSL Increases Online Sales and Transactions
Tags : 
symantec, extended validation, ssl, phishing, e-commerce
    
Symantec
Published By: FireEye     Published Date: Sep 11, 2012
How to Stop Spear Phishing Attacks: Combating the Attack of Choice for Cybercriminals
Tags : 
fireeye, phishing, cybercrimicals, security
    
FireEye
Published By: Mimecast     Published Date: Apr 04, 2013
The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability, encryption and better protection from targeted phishing attacks.
Tags : 
email, security, dlp, data loss prevention, encryption, business continuity, access control, anti spam, anti spyware, anti virus, email security, firewalls, high availability, internet security, intrusion detection, intrusion prevention, phishing, security management
    
Mimecast
Published By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway
    
Cisco
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises, networking, security
    
Cisco
Published By: NAVEX Global     Published Date: Aug 18, 2016
A simple way companies can test their employees’ knowledge of cyber security is to create a sample phishing email to test employees’ propensity to fall for this kind of scheme.
Tags : 
    
NAVEX Global
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security
    
Mimecast
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security
    
Mimecast
Published By: Mimecast     Published Date: Aug 30, 2016
In this white paper, you’ll get: - An inside look at the anatomy of a spear-phishing attack - Details on how mistakes are made and vulnerabilities exploited - Ideas for preparing your employees and systems"
Tags : 
mimecast, phishing, security, spear-phishing, cyber attacks, cyber security
    
Mimecast
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfähigkeit verschiedener E-Mail Security Lösungen. Der ESRA Report wird quartalsweise durchgeführt und auch der aktuelle Report stellt Lücken bei vielen Systemen im Schutz von Unternehmen gegen bösartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen über E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingänge der Benutzer übermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience für E-Mails erhöhen und mit einem mehrschichtigen Ansatz deutlich die Sicherheit für Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information, hacker detection, security management
    
Microsoft Office 365
Published By: Lenovo and Intel     Published Date: Oct 17, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo and Intel
Published By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : 
hack, malware, intellectual, property, compliance
    
LogRhythm
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.