Blog

Blog

Is Office 365 an Email Fraudster's Paradise?

Business Email Compromise (BEC) is on the rise, and Office 365 users are among the most heavily targeted. With new LinkedIn-integration features potentially upping the stakes, here's what you need to know now.It's official: Office 365 users will soon be able to co-edit documents from within LinkedIn. But who wins more—businesses and their employees? Or the email fraudsters who increasingly launch...
Blog

The CMO's Guide to Email Deliverability

The email channel has always been the linchpin of your digital marketing operations. But a failure to use something called DMARC could obliterate your deliverability rates, your revenues—even your brand.It's no secret to digital-savvy CMOs that old-school email is a cutting-edge marketing team's killer app.But what you don't know is something called "Domain-based Message Authentication, Reporting ...
Blog

With Losses from Email Attacks Rising Fast, is it Automate—or Else?

A growing number of attacks on businesses and their customers are evading email security systems. Can automation really make the difference?If you’re reading this blog post, chances are your current email security controls are leaving something to be desired. With the sheer volume of email rising fast and cybercriminals continuing to prioritize email over all other threat vectors combined, is...
Blog

Can 'Brand Indicators' Stop Email Scammers from Posing as Your Brand?

As email marketing turns 40, more than 90% of companies report fraudsters have impersonated their brand in phishing attacks targeting their customers. Can a new standard known as BIMI be the answer?Forty-years-old and still the center of attention, despite younger competition. It's true: Email marketing's hotter than ever. But it's also facing a growing threat from brand impersonation scams. Can a...
Blog

The ROI of Advanced Breach and Email Fraud Prevention

You’ve seen headlines like "Facebook and Google were Scammed Out of $100 Million" and "Equifax's Massive Data Breach Has Cost the Company $4 Billion So Far." Despite significant investments in email security solutions, the threat from an endless barrage of spear-phishing attacks, business email compromise (BEC) schemes, account takeover-based attacks (ATOs) and other advanced email threats that...
Blog

BEC: What Real Estate Marketers Need to Know About the Spike in Email Scams

Losses from business email compromise (BEC) attacks targeting title companies, real estate firms and others are up 136% in just 18 months. Here's what you need to know to avoid becoming the next victim Real estate industry marketers seeking to grow revenues and boost market share are increasingly facing a threat that can decimate their competitive position: Business Email Compromise (BEC). That...
Blog

BEC Advanced Email Attacks Targeting Financial Institutions Growing Costlier

Recent Dark Web activity points to a boom in assaults against financial services organizations and their customers—and why advanced email attacks via business email compromise remain cybercriminals’ preferred point of entry A 150% increase in cyberattacks in recent months may have financial services organizations focusing on protecting corporate systems while ignoring their Achilles heel—advanced...
Blog

Email Fraud: Modeling, Time-Series Analysis & Predicting the Next Attack

After the typical malicious email attack is launched, its first victim will be compromised in under 4 minutes. Now, emerging, predictive models may point to new ways to neutralize that threat.Data science may soon be able to predict when the next email fraud attack will hit your company's inboxes. But why should we care?After all, what's the value of being able to predict these assaults? Is an...
Blog

Half of Federal Agencies Racing to Meet DMARC Active Enforcement Deadline

Executive branch DMARC adoption hits 81%—but with roughly 90 days to go, most have yet to implement required enforcement policy levels across all .gov domainsWith less than three months left to comply with the Department of Homeland Security's Binding Operational Directive (BOD) 18-01 deadline, adoption of Domain-based Message Authentication, Reporting and Compliance (DMARC) protocols for email...
Blog

GDPR and the Insider Threat: How New Regulations are Changing Our Data Handling Habits

Clearswift’s Adaptive Data Loss Prevention (A-DLP) solution has the ability to inspect all content coming in and going out of the organization – whether through email or the web – to prevent any sensitive information being shared or exposed unauthorized. The document sanitization and adaptive redaction features ensure that GDPR compliance is upheld by scanning all emails and documents flowing in and out of the business, detecting and removing only the critical information which could cause a data breach.
Blog

Email Fraud: Predicting the Next Malicious Email to Hit Your Business

As the number of highly-targeted, fraud-based email attacks on employees continues to rise, what if there was a way to forecast when the next one will hit their inboxes? As it turns out, there very well may be.In case there was any remaining doubt that data science is cool, recent analysis from Agari researchers studying emerging patterns in email fraud may forever put that doubt to rest.In fact,...
Blog

Brand Impersonation Scams Skyrocketing—is DMARC Email Security the Answer?

Don't look now, but a growing number of phishing attacks are luring in your customers—by impersonating your brand.As if all the spear-phishing attacks against your company weren't bad enough, just wait until you see the scams targeting your customers with email messages appearing to come from your brand.With impersonation attacks surging in recent months, some are wondering: Is DMARC email...
Blog

FBI's Big BEC Bust: The Rapidly-Evolving Phishing Threat & New Ways to Stop It

Part 3 of a 4-part seriesView Next in Series | View Previous in Series'Operation WireWire' disrupted $14 million in scams—but as business email compromise spikes, innovative approaches to cybersecurity gain new urgencyBy all accounts, "Operation WireWire" was a massively successful crackdown against business email compromise (BEC) rackets around the globe. But did it really just raise more alarm?...
Blog

Weaponizing GDPR: When Right to Be Forgotten (RTBF) Gets Ugly

An inadvertent and unfortunate consequence of the new GDPR rules is that the right to erasure is now free to submit meaning it is much easier to have your data removed. With our research revealing that only 34% of organizations have actually successfully completed a ‘right to be forgotten’ (RTBF) request, there is a potential to weaponize the regulation, giving hacktivists a new opportunity to drain a company’s resources and grind the business to a halt.
Blog

Investing in Email Security and Trusted Communication

As more business communication and commerce becomes digital, it becomes increasingly important to have trusted and secure email communication. Hackers have recognized that email, which is the cornerstone of digital identity, can be exploited in increasingly sophisticated impersonation and phishing attacks to cause billions of dollars of harm and moreover, damage the trust and reputation that...
Blog

New Agari Release Amplifies Protection Against Rise in Advanced Identity Deception Attacks

From 'Search & Destroy' to Granular Analysis and Beyond: New Machine Learning Tools Enhance Detection, Visualization & Remediation Against a Growing ThreatWith advanced identity deception-based email attacks expected to contribute to worldwide losses of more than $600 billion this year, businesses can't afford to let down their guard against the threats hitting their inboxes.Fact #1: 95%of all...
Blog

Has Your Multifunction Printer Become A Data Loss Risk? Consider DLP For Images.

Optical Character Recognition (OCR) as a technology has been around for a long time. It inspects images for text and then decodes them. While the human eye is fantastic at recognizing text, be it upside down or at an angle, it is computationally intensive to do this by machine on a regular basis. However, new algorithms now exist to deal with skew (angled text) as well as being able to handle multiple languages. The latest versions of Clearswift’s email product portfolio – the SECURE Email Gateway (SEG), SECURE Exchange Gateway (SXG) and ARgon – have a new cost option for OCR to mitigate this risk.
Blog

Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast!

Cloud storage services and file sharing apps such as Dropbox, Box, Microsoft OneDrive and Google Drive are so widely adopted by employees—knowingly or unknowingly by their IT departments—that most don’t think twice about using them to share corporate information.
Blog

The GDPR Deadline is Here – So What Next?

It’s finally here, the EU General Data Protection Regulation (GDPR) is now in full effect. Is that a sigh of relief I hear? Well, it shouldn’t be too heavy a sigh, there’s still work to be done. The first thing to remember is that just because it’s the 25th May, doesn’t mean GDPR efforts are over. In fact, there should be a bigger push than ever to ensure your organization is compliant and remains compliant going forwards.