Blog

Blog

Think Your Encrypted Email Is Secure? It Might Be. . . Or Not!

When sending out an email, a lot can go wrong. To get around that, many people encrypt. And that’s a great solution. But a lot can go wrong with that, too.Is the answer to this to start delivering all your messages by hand or pigeon carrier? No. But it certainly involves having a multi-dimensional view of what it is to send a fully secure email and an understanding of the ways in which we can mess...
Blog

Zero-Day Threats: How Cloud Email Security Can Mitigate Risks

By Q3 2024, organizations encountered credential theft in nearly 50% of all email security threats they handled, while malware grew by 4% which is the highest amount of volume since Q1. Learn how cloud-based solutions can help detect and prevent zero-day attacks like malware and more.
Blog

Best Practices for Using Secure Encrypted Email in Business

Attackers increasingly use sophisticated methods to spy on your emails directly, which is why the very information contained therein needs to be encrypted. This is defense in depth, not only protecting your email from without but securing it from within.
Blog

Harrowing Tales of Social Engineering Attacks from the Trenches

The social engineering attacks that businesses are seeing today – from hiding payloads in files to commit fraud, to quishing and smishing – and what can be done about them.
Blog

Harnessing Data Science and AI in Cybersecurity

In this Solutions Review article, Ravisha Chugh from Fortra explains how companies are harnessing data science and AI technologies in their cybersecurity initiatives.
Blog

Will 2024’s Presidential Election Day Be Groundhog Day When It Comes to Nation-State Email Attacks?

With 2024's presidential election around the corner, Fortra discusses the blunt-force impact of campaigns not hardening their cybersecurity, such as campaign impersonation, donation scams and fraud, and the possibility that it will be cybercriminals who decide the next President of the United States—not voters.
Blog

How to Defend Against Stegomalware

Stegomalware is still a relatively unknown term but is becoming more widely leveraged in malware. So you need to know about this semi-low-tech, yet innovative tactic that is imperceptible to the human eye.
Blog

What You Need to Know About Stegomalware

It all sounds like the stuff of Sherlock Holmes or “Mission Impossible”, but steganographic malware, or stegomalware for short, is a real thing that broadly describes a host of tactics used to hide data in plain sight.
Blog

Preventing Email Leaks in Business Environments

By understanding email data leaks, their value to attackers, and their root causes, organizations can stay savvy and set up the right tools to thwart many email-targeting attempts.
Blog

Frost Radar Names Fortra as Email Security Leader

We are thrilled to announce that Frost & Sullivan has ranked Fortra as a leader in our space. With the release of the Frost Radar for Email Security™, Frost & Sullivan has determined that Fortra Email Security is a leader in the industry, having increasing its revenue distribution in North America by 30%, as well as penetration in the cloud security market and in the banking and finance verticals...
Blog

How Fortra's Clearswift Secure Email Gateway Aligns to NCSC's Email Security Guidelines

Working in cybersecurity is one of the most challenging roles in the organisation. Not only are you tasked with keeping the business and its data safe and secure, but you must do so in the face of ever-increasing professionalism and sophistication on the part of cybercriminals.There are more threats than ever before, and the consequences of a data breach are more significant too. In recent Fortra...
Blog

March Madness Challenge for Cybersecurity Professionals

Let the "madness" begin! The NCAA Basketball tournament is different for everyone. Some experience madness after a gut-wrenching triple overtime victory by their alma mater, while others after a buzzer-beater shot from half-court by a 16th-ranked Cinderella underdog that instantly knocks out one of your final four selections. However, to me there is nothing more maddening, in the delightful sense...
Blog

Are Broad Email Security Policies Slowing You Down?

Creating policies for your organization's email security can be complex, time consuming, and even stressful. There are nearly a thousand exceptions that make a case for why policy development and deployment cannot be a standard one-size-fits-all practice. Learn how Fortra's Clearswift can keep your organization safe without slowing you down.
Blog

Microsoft's Defender for Identity – Is it Enough?

In early 2023, Microsoft launched Defender for Identity which aims to offer visibility by helping to identify threats and provide actionable reports on attacks. But M365 security is not completely adequate for the modern enterprise and must be augmented by other data security solutions.
Blog

Phishing with Invisible Ink

You might remember as a child, there was a revelation…invisible ink. Stepping forward to today, there is now a new type of phishing which uses invisible ink, or as it’s also called, ‘zero font’, as a means to beat the spam and phishing filters. Anti-spam / phishing filters work in several different ways; they look for specific words or phrases and there is then a statistical element. If there are 100,000 instances of the same message, it’s probably spam.
Blog

What Is Whaling Phishing & How Does It Work?

“Whaling” phishing fraud attacks target the C-suite of a company which creates high risk of extremely sensitive, mission-critical data being stolen and exposed. Fortunately, protecting the organization from these attacks is possible.Whaling phishing is a type of phishing attack targeting larger, high-value targets, which is why it's called "Whaling." Attackers themselves often pretend to be C...
Blog

September Was Insider Threat Awareness Month

Insider threats may not get as much attention as the outsider threats. Outsider threats are overwhelmingly malicious in intent. Organizations must protect their data with a strong barrier, because the “bad guys” are on the outside. However, inside the walls of an organization can be a disgruntled employee wanting to cause harm or an employee incentivized from outside the organization. Then of...