Resources

On-Demand Webinar

Spam Mechanisms in the Secure Email Gateway

This first webinar in a series of five spanning Best Practices for using Clearswift's Secure Gateways covered the more than 15 configurable spam mechanisms in the Secure Email Gateway (SEG) appliance with a choice of local or global policy. Listen as Dr. Steve Jeffery, Lead Solutions Engineer at Fortra, discusses the spam rules, where they get evaluated, URL detection, and message sanitisation....
On-Demand Webinar

Leveraging AI to Combat Email Attacks

In today's digital landscape, email remains a cornerstone of business communication, yet its ubiquity makes it a prime target for sophisticated attacks like BEC and brand impersonation. These attacks have a significant impact on financial organizations as they can lead to direct financial and reputational loss. While traditional email security measures help, many fall short. To combat this,...
Blog

Top Threats to Cloud Email Security and How to Mitigate Them

A summary of common threats faced by cloud email systems beyond malware and data breaches, this blog provides actionable tips and best practices for businesses to protect their email systems.
Guide

Enhancing Microsoft's Security with Fortra Email Security

As Microsoft’s security capabilities continue to evolve, many organizations are questioning how much they should rely on Microsoft for their email security needs. In this guide, we observe where Microsoft may not be enough when it comes to comprehensive threat protection.
Datasheet

Email Security Expert Services

Business ChallengeFortra’s cloud-based email security solutions allow you to stop and respond to BEC and phishing attacks on your employees and protect your customers. Fortra’s Customer Enablement and Support organization is committed to the success of its customers and works to ensure they achieve value through the deployment of our Email Security...
Blog

Harrowing Tales of Social Engineering Attacks from the Trenches

The social engineering attacks that businesses are seeing today – from hiding payloads in files to commit fraud, to quishing and smishing – and what can be done about them.
Blog

Active Phishing Campaign: Twilio SendGrid Abuse

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sample 1: Vishing Example Sample 2: Office365 Phishing Example...
Blog

Active Phishing Campaign: QR Code Attachment O365 Attack

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sender...
Blog

Active Phishing Campaign: Form Assembly Abuse

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. To protect the privacy of Fortra’s clients, the brand targeted in this attack has been anonymized and is generically referred to as “Brand” whenever their name appears in the...
Blog

Harnessing Data Science and AI in Cybersecurity

In this Solutions Review article, Ravisha Chugh from Fortra explains how companies are harnessing data science and AI technologies in their cybersecurity initiatives.
Blog

Will 2024’s Presidential Election Day Be Groundhog Day When It Comes to Nation-State Email Attacks?

With 2024's presidential election around the corner, Fortra discusses the blunt-force impact of campaigns not hardening their cybersecurity, such as campaign impersonation, donation scams and fraud, and the possibility that it will be cybercriminals who decide the next President of the United States—not voters.
Blog

Understanding DMARC Reports

Why is it so important to analyze DMARC reports? Well, it makes it so organizations can detect malicious emails and prioritize source configuration, all of which is crucial for maintaining their email security.
On-Demand Webinar

Intro to Email Security Bundles

This webinar discusses how inefficiencies in combating phishing result in lost time and productivity for employees and internal SOC teams. Luckily, Fortra Email Security has introduced interoperable bundle packages that can stop advanced email threats over the entire lifecycle from pre-delivery staging to post-delivery remediation. Mike Jones outlines these bundle...
Blog

How to Defend Against Stegomalware

Stegomalware is still a relatively unknown term but is becoming more widely leveraged in malware. So you need to know about this semi-low-tech, yet innovative tactic that is imperceptible to the human eye.
Blog

What You Need to Know About Stegomalware

It all sounds like the stuff of Sherlock Holmes or “Mission Impossible”, but steganographic malware, or stegomalware for short, is a real thing that broadly describes a host of tactics used to hide data in plain sight.
On-Demand Webinar

Is Malware Using Steganography on Your Network?

As cyber threats become more evasive, technology that protects organizations must have the capability to look deeper into the content flowing in and out of an organisation's network. More and more, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or sensitive data out of networks. In this webinar, Dr. Steve Jeffery outlines...
Blog

How to Set Up DMARC: Step-by-Step Guide

We'll explain how to configure DMARC for your company's email, including what you'll need and how to add DMARC to your DNS. Just follow these DMARC setup steps! But before we begin, here’s a high-level overview of how to add DMARC to your DNS.Add your DMARC record into your DNSSelect the TXT record typeAdd the host value (see details below)Add the value information (see details below)Save the...
Blog

Preventing Email Leaks in Business Environments

By understanding email data leaks, their value to attackers, and their root causes, organizations can stay savvy and set up the right tools to thwart many email-targeting attempts.