Resources

Blog

BEC: What Real Estate Marketers Need to Know About the Spike in Email Scams

Losses from business email compromise (BEC) attacks targeting title companies, real estate firms and others are up 136% in just 18 months. Here's what you need to know to avoid becoming the next victim Real estate industry marketers seeking to grow revenues and boost market share are increasingly facing a threat that can decimate their competitive position: Business Email Compromise (BEC). That...
Blog

BEC Advanced Email Attacks Targeting Financial Institutions Growing Costlier

Recent Dark Web activity points to a boom in assaults against financial services organizations and their customers—and why advanced email attacks via business email compromise remain cybercriminals’ preferred point of entry A 150% increase in cyberattacks in recent months may have financial services organizations focusing on protecting corporate systems while ignoring their Achilles heel—advanced...
Blog

Email Fraud: Modeling, Time-Series Analysis & Predicting the Next Attack

After the typical malicious email attack is launched, its first victim will be compromised in under 4 minutes. Now, emerging, predictive models may point to new ways to neutralize that threat.Data science may soon be able to predict when the next email fraud attack will hit your company's inboxes. But why should we care?After all, what's the value of being able to predict these assaults? Is an...
Blog

Half of Federal Agencies Racing to Meet DMARC Active Enforcement Deadline

Executive branch DMARC adoption hits 81%—but with roughly 90 days to go, most have yet to implement required enforcement policy levels across all .gov domainsWith less than three months left to comply with the Department of Homeland Security's Binding Operational Directive (BOD) 18-01 deadline, adoption of Domain-based Message Authentication, Reporting and Compliance (DMARC) protocols for email...
Blog

GDPR and the Insider Threat: How New Regulations are Changing Our Data Handling Habits

Clearswift’s Adaptive Data Loss Prevention (A-DLP) solution has the ability to inspect all content coming in and going out of the organization – whether through email or the web – to prevent any sensitive information being shared or exposed unauthorized. The document sanitization and adaptive redaction features ensure that GDPR compliance is upheld by scanning all emails and documents flowing in and out of the business, detecting and removing only the critical information which could cause a data breach.
Blog

Email Fraud: Predicting the Next Malicious Email to Hit Your Business

As the number of highly-targeted, fraud-based email attacks on employees continues to rise, what if there was a way to forecast when the next one will hit their inboxes? As it turns out, there very well may be.In case there was any remaining doubt that data science is cool, recent analysis from Agari researchers studying emerging patterns in email fraud may forever put that doubt to rest.In fact,...
Blog

Brand Impersonation Scams Skyrocketing—is DMARC Email Security the Answer?

Don't look now, but a growing number of phishing attacks are luring in your customers—by impersonating your brand.As if all the spear-phishing attacks against your company weren't bad enough, just wait until you see the scams targeting your customers with email messages appearing to come from your brand.With impersonation attacks surging in recent months, some are wondering: Is DMARC email...
Blog

FBI's Big BEC Bust: The Rapidly-Evolving Phishing Threat & New Ways to Stop It

Part 3 of a 4-part seriesView Next in Series | View Previous in Series'Operation WireWire' disrupted $14 million in scams—but as business email compromise spikes, innovative approaches to cybersecurity gain new urgencyBy all accounts, "Operation WireWire" was a massively successful crackdown against business email compromise (BEC) rackets around the globe. But did it really just raise more alarm?...
Blog

Weaponizing GDPR: When Right to Be Forgotten (RTBF) Gets Ugly

An inadvertent and unfortunate consequence of the new GDPR rules is that the right to erasure is now free to submit meaning it is much easier to have your data removed. With our research revealing that only 34% of organizations have actually successfully completed a ‘right to be forgotten’ (RTBF) request, there is a potential to weaponize the regulation, giving hacktivists a new opportunity to drain a company’s resources and grind the business to a halt.
Blog

Investing in Email Security and Trusted Communication

As more business communication and commerce becomes digital, it becomes increasingly important to have trusted and secure email communication. Hackers have recognized that email, which is the cornerstone of digital identity, can be exploited in increasingly sophisticated impersonation and phishing attacks to cause billions of dollars of harm and moreover, damage the trust and reputation that...
Blog

New Agari Release Amplifies Protection Against Rise in Advanced Identity Deception Attacks

From 'Search & Destroy' to Granular Analysis and Beyond: New Machine Learning Tools Enhance Detection, Visualization & Remediation Against a Growing ThreatWith advanced identity deception-based email attacks expected to contribute to worldwide losses of more than $600 billion this year, businesses can't afford to let down their guard against the threats hitting their inboxes.Fact #1: 95%of all...
Blog

Has Your Multifunction Printer Become A Data Loss Risk? Consider DLP For Images.

Optical Character Recognition (OCR) as a technology has been around for a long time. It inspects images for text and then decodes them. While the human eye is fantastic at recognizing text, be it upside down or at an angle, it is computationally intensive to do this by machine on a regular basis. However, new algorithms now exist to deal with skew (angled text) as well as being able to handle multiple languages. The latest versions of Clearswift’s email product portfolio – the SECURE Email Gateway (SEG), SECURE Exchange Gateway (SXG) and ARgon – have a new cost option for OCR to mitigate this risk.
Blog

Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast!

Cloud storage services and file sharing apps such as Dropbox, Box, Microsoft OneDrive and Google Drive are so widely adopted by employees—knowingly or unknowingly by their IT departments—that most don’t think twice about using them to share corporate information.
Blog

The GDPR Deadline is Here – So What Next?

It’s finally here, the EU General Data Protection Regulation (GDPR) is now in full effect. Is that a sigh of relief I hear? Well, it shouldn’t be too heavy a sigh, there’s still work to be done. The first thing to remember is that just because it’s the 25th May, doesn’t mean GDPR efforts are over. In fact, there should be a bigger push than ever to ensure your organization is compliant and remains compliant going forwards.
Blog

10 Business Email Compromise (BEC) Criminal Organizations Unmasked

Today, Agari has published “Behind the ‘From’ Lines: Email Fraud on a Global Scale,” a historic report that I believe is the first of its kind (but definitely not the last!). During the past 10 months, Agari has captured criminal email accounts using responsible active defense techniques, granting us unparalleled access and insight into the operation of these organized crime groups. By...
Blog

GDPR AND YOUR EMAIL CHANNEL—Four things you need to know

The European Union’s new privacy law, the General Data Protection Regulation (GDPR), comes into effect on May 25, 2018 and has many ramifications for any organization doing business in the EU. Essentially, the regulation defines how businesses collect and store information on their customers and other private citizens. GDPR goes beyond the current standard of the EU Privacy Directive with...
Blog

DMARC Taking Too Long? Try Rapid DMARC

DMARC builds on two earlier email authentication standards: SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). DMARC was a critical development because both of these earlier standards, while effective, contain important gaps. Why is DMARC Important? Unless you’re one of the rare people on the planet that doesn’t use email for business and personal communications, you know that...
Blog

GDPR - It’s Not Just for Europe: Protection of Data at the World Cup in Russia, Tokyo Olympics, and Beyond

With the World Cup in Russia this summer and the Olympics in Tokyo in 2020 further down the line; organizations conducting business around the event will face unprecedented challenges with cybersecurity and data protection. With the rise in data breaches in recent times, it might not be too strong to say that the success of these major international events relies upon the whole country being data security conscious. Everything from local hotels to travel agents and tour operators will process increasingly large quantities of customer data, including credit card details, making them ripe targets for cybercriminals. This personally identifiable data (PII) will include EU citizen data and so will need to be protected as per the EU General Data Protection Regulation (GDPR).
Blog

Account Takeover-Based Email Attacks Increased by 126% in 2018

If the term “Account Takeover” (ATO) wasn’t part of your cybersecurity vocabulary before, it likely will be soon. According to a new report published by Agari, Account Takeover-based email attacks are on the rise. The research conducted by Agari sites a 126% increase month to month in targeted email attacks that exploit Account Takeover tactics since the beginning of 2018.To execute an Account...
Blog

BIMI is the Next Chapter in Email Authentication

Today’s announcement that deployment of Brand Indicators for Message Identification (BIMI) has begun marks the next chapter in the fight to make the world safe from identity deception.Many of BIMI’s developers, including Agari, worked together from 2010 to 2013 to develop the DMARC email authentication standard, aimed at stopping the plague of phishing and other email attacks. Billions of phish...