banner-blog.jpg

blog

How to Mitigate Phishing Threats inYour Organization

Posted by Kowsik Guruswamy on Dec 5, 2019

From a bad actor perspective, phishing is the cheapest and easiest way to infiltrate organizations and personal information
to make a profit. By nature, humans are curious and are oft en overconfident when it comes to security. Phishing is an even greater threat for mobile users, too. Without key visual cues, like the ability to hover over a link to determine its destination, it is much easier for a user to make the simple mistake of clicking a bad link and falling victim to a phishing attempt. The popularity of social media has also made it much easier for hackers to find valid email addresses and research users’
life activities to create sophisticated, tailored phishing attacks.  From a security perspective, there are typically three approaches to solving the phishing problem – email security gateways, web proxies and security training awareness – but each has its own limitations.

Read More

Tags: phishing, email attachments, anti-phishing, phishing prevention, Google Docs email scam, email threats

Why Outsmart Cyber Attackers When You Can Remove Them Entirely?

Posted by Kowsik Guruswamy on Dec 5, 2019

Cyber threat actors have gotten smarter--or lazier--depending on your perspective. It used to be fairly
common for attackers to spend days or even weeks probing targeted networks for vulnerabilities to
exploit. Once identified, they would break down traditional cybersecurity defenses around the network
perimeter and steal as much information as they could, or cause as much chaos as possible, before the
hole was patched and they were shut out.

Today, threat actors are much more subtle. Instead of trying to break down the castle walls, they simply
steal the keys and stroll through the front door. By tricking users into willfully giving up their credentials
through spear phishing, threat actors can simply remain undetected for days, weeks or even months until
the time is right to execute their mission-- to extricate data, hold systems hostage, spy on users or all of
the above.

Is this lazy or creative? Depends on who you ask, maybe it’s a generational thing.

Read More

Tags: email threats, security breach, ZeroTrust Internet, Secure Web Access

Attackers Are Thinking About Phishing Differently, So Should You

Posted by Mehul Patel on Jul 9, 2019

Every day new phishing campaigns are making the news. One is posing as legitimate emails from the Department of Homeland Security, the next pretends to be an alert from your email server that it has received an encrypted message for you, prompting you to log into a fake OneDrive site. Malicious actors know phishing campaigns are getting easier to identify. As a result, they continue to create new and more creative ideas to trick people. In fact, the 2019 Verizon Data Breach Investigations Report stated that phishing was involved in one third of all cyber attacks across all industries. The reason that number is so high is because even though cyber defenses, in general, are also becoming stronger, phishing attacks prevail, affecting businesses small and large. Attackers can rely on the fact that phishing has proven to be effective.

Read More

Tags: email threats, Web Security, ZeroTrust

Gartner Cool Vendor Report Names Menlo Security and Describes Benefits of Browser Isolation

Posted by Peter Lunk on Jun 16, 2017

If you find it challenging to prioritize which security innovations to implement this year, this latest Gartner report can help. It names Menlo Security as a 2017 Cool Vendor for Security for Mid-Size Enterprise, and explains how any resource-constrained IT team can use browser isolation to reduce exposure to malware and phishing attacks.

Read More

Tags: cybersecurity, isolation, browser, gartner, anti-phishing, spear-phishing, remote browsing, browser-based attacks, cyber attacks, email threats

Is Your Web Viewing Dangerous? Over 350k Web Sites Run Vulnerable Software

Posted by Peter Lunk on May 25, 2017

Over 350,000 of the world’s top 1 million web sites may be running vulnerable software --  which the recent WannaCry cyber attack has shown can spell considerable risk of hacker exploitation. According to the Menlo Security State of The Web report, software on some web sites dates back to over a decade ago, as far back as the year 2000. The cyber security research reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky, and that 1 in 5 domains run vulnerable software.

Read More

Tags: isolation, ransomware, credential theft, malware vulnerabilities, phishing prevention, spear-phishing, banks, cyber attacks, wannacry, hackers, financial security firms, credit unions, web threats, email threats

Connect with us

Lists by Topic

see all

Recent Posts