Resources

On-Demand Webinar

Spam Mechanisms in the Secure Email Gateway

This first webinar in a series of five spanning Best Practices for using Clearswift's Secure Gateways covered the more than 15 configurable spam mechanisms in the Secure Email Gateway (SEG) appliance with a choice of local or global policy. Listen as Dr. Steve Jeffery, Lead Solutions Engineer at Fortra, discusses the spam rules, where they get evaluated, URL detection, and message sanitisation....
Guide

Managing Cybersecurity Risk in the Supply Chain

In this guide we examine today’s expanding attack surfaces, look at real world supply chain attack examples and offer guidance on how to mitigate risk by incorporating a comprehensive cyber and data security strategy.
Guide

Email Security Toolkit

Email remains the bullseye of many cyberattacks as organizations depend on email for collaboration. Phishing and malware remain fruitful tactics for gaining access to sensitive data. The inbound and outbound sharing of information can be vulnerable to data breaches if an email security solution is not present, or the present solution has security gaps.A strong email security front is an effective...
Guide

Effective Strategies for Protecting Against BEC

While BEC is incredibly simple and effective, it is not unstoppable. However, organizations need to go beyond traditional email security measures to detect, block, and prevent email impersonations. Learn the ways in which organizations should think about advanced email security solutions to stop this growing threat. Readers will learn:Why BEC is so difficult to combatWhat is needed to protect your...
On-Demand Webinar

Email Impersonation and Machine Learning

Over 98% of threats reaching user inboxes impersonate individuals or brands to slip past email filters. In this video, Fortra’s Advanced Email Security experts discuss how machine learning models can help detect and remove email impersonation threats at scale.You’ll learn:The machine learning applications for comprehensive email threat detectionHow mapping email senders informs models to ferret...
Guide

Exaggerated Lion Threat Dossier: BEC Check Fraud Ring

Exaggerated Lion is a BEC cybercrime ring that operates out of Africa with members in Nigeria, Ghana, and Kenya.This is one of the most prolific BEC groups ever discovered, targeting more than 3,000 employees at nearly 2,100 companies throughout the United States.Download this report for details including:How they name, register and host domains disguised to mimic trusted infrastructure.Their...
Guide

BEC: Why This Basic Threat Is Difficult to Detect

Business Email Compromise (BEC) is “one of the most financially damaging online crimes” according to the FBI1. It is a cunning form of email impersonation that, when combined with human error, can be incredibly disruptive and damaging
Guide

Ransomware: Exploring the Leading Cyber Extortion Tool

Ransomware has evolved from targeting individuals to extorting large sums of money from businesses with the threat of releasing or destroying their private company data. This type of email-based attack can cause tremendous financial losses as well as reputation damage that’s difficult and expensive to repair.Read our ransomware whitepaper now for insights about:The fundamentals of ransomware...
On-Demand Webinar

How to Mitigate Three Prevalent Advanced Email Threats Webinar

Watch Fortra experts, Cary Hudgins and Mike Jones, as well as Forrester Principal Analyst, Jess Burn, navigate the sophisticated email attacks that continue to prey on enterprise users.Advanced human-targeted attacks that trick unsuspecting recipients into interacting with or responding are becoming more pervasive, like quishing (aka QR code phishing), social engineering and O365 lures, and so...
Guide

A Window on Email Security

This whitepaper takes an expansive look at the hidden threats lurking around email inboxes, and how layered email security with a clear understanding of goals can keep your organization better protected.
On-Demand Webinar

Is Microsoft Email Security Enough in 2024?

As Microsoft’s security capabilities continue to evolve, many organizations are questioning how much they should rely on Microsoft for their email security needs. Watch this webinar to hear Fortra experts discuss enterprise email security requirements and how Microsoft fits into the equation and where it falls short, along with:How to evaluate Microsoft’s role in your email security stackWhat...
On-Demand Webinar

Introduction to Fortra’s Cloud Email Protection Platform

Advanced email threats continue to be a stark reality for enterprises. Even with Secure Email Gateways in place, deceptive attacks like BEC, targeted social engineering ploys, and spear phishing attempts can still get into user inboxes. In this video, Fortra’s Advanced Email Security experts discuss how Fortra’s Cloud Email Protection, a new integrated cloud email security platform, delivers multi...
On-Demand Webinar

2023 BEC and Email Impersonation Trends

More than 90% of the threats that reach user inboxes, including BEC, rely on email impersonation. They pass through email security gateways and use social engineering to compromise their targets. Watch John Wilson, Fortra’s Senior Fellow of Threat Research, examine campaigns, tactics, and infrastructure used in recent BEC and email impersonation attacks so that you can better defend against these...
On-Demand Webinar

DMARC Revisited: Email Authentication in 2024

Implementing DMARC is one of the simplest ways to prevent email spoofing and ensure consistent email deliverability. Fortra DMARC Protection will lead you through a safe and efficient DMARC implementation with features that allow you to:Catalogue and authenticate all legitimate senders–both 3rd-party and internalNavigate past common authentication pitfallsComply with today’s major email provider...
Guide

Silent Starling Threat Dossier: BEC to VEC

Vendor email compromise is a new form of advanced email attack that uses compromised email accounts to target the global supply chain. With the cybercriminal group we’ve named Silent Starling, we see how devastating these attacks can be.Download the threat actor dossier to learn:How Silent Starling uses phishing email lures to target their victimsWhy compromised email accounts make email attacks...
Guide

Six Steps to Email Security Best Practice

To help IT Teams define a robust, email security policy and determine what’s required from an Email Security solution, we’ve put together a simple six-step guide to email security best practices.
Guide

PCI Compliance Best Practices

While the database issues and solutions are well known, the real challenge is around unstructured data, where credit card information finds its way into email and documents, these are then transferred around and outside the organization creating unnecessary risk.