Resources

Blog

Six Steps to Email Security Best Practice

To help IT teams define a robust email security policy and determine what’s required from an email security solution, we’ve put together a new six-step guide.
Blog

Common Phishing Email Attacks | Examples & Descriptions

What does a phishing email look like? We've compiled phishing email examples to help show what a spoofed email looks like to prevent against phishing attacks. Brand deception phishing is the most common example of phishing people will come across. Brand deception phishing occurs when an attacker mimics a trusted company in an email and asks someone for their personal information like credit card...
Blog

What Is Email Phishing? Protect Your Enterprise

Phishing emails can steal sensitive data and cost companies' their reputation. However, protecting a company from these scammers doesn't need to be difficult. What Is Email Phishing? Phishing is when an attacker mimics a trusted person or brand in an attempt to steal sensitive information, or gain a foothold inside a company network. While phishing emails are by far the most popular, these...
Blog

Identifying and Mitigating Email Threats

Email threats are ever evolving, and it’s important to stay up to date. Here are the current most common email threats and how to identify and mitigate them. So, what are the most common types of email threats today?Business Email CompromiseRansomwarePhishingSpear PhishingData BreachSpamKeyloggersDomain ImpersonationWe’ll explain these and more. Then, we’ll cover how to prevent, mitigate, and...
Blog

It’s the Most Wonderful Time of the Year… for Cybercriminals

The holiday season is upon us, which means it’s also the busiest time of the year for online shopping. There’s Black Friday, Cyber Monday, and gifts to buy for loved ones. Plus, gifts to buy for yourself when the deals are this good! But beware, for cybercriminals ‘tis also the season to scam millions of dollars from unsuspecting people and companies. They’re banking on people being in a rush and...
Blog

How to Neutralize the Rising Threat of Ransomware

In IBM's "Cost of a Data Breach 2022" report, the average payout for ransom was $812,360. The steady payout incline suggests that ransomware remains big business for cyber criminals, particularly as successful execution means easy money without the need for malicious actors to worry about exfiltration of the data they have stolen. On top of this, the tools for a ransomware attack are becoming...
Blog

Spear Phishing: What Is It & How to Prevent It

Spear phishing is more focused than regular phishing. To protect against this type of phishing, your entire company will need to be educated and protected.What Is a Typical Spear Phishing Attempt?A typical spear phishing attempt is a fraudulent personalized email that is usually sent with an attachment or requests a response. The fraudster then tries to entice the recipient to open the infected...
Blog

Email Protection: Tools for Maximum Security

If you haven’t protected your email yet, you’re open to attacks. This comprehensive guide explains what you need for complete email protection and where to get it.Email protection solutions provide features like spam filtering, firewalls, anti-phishing controls, antivirus policies, spyware detection, login security, data loss protection, and encryption to help secure your organization against...
Blog

What Is a Phishing Attack? Types, Defenses & Prevention

Phishing attacks are all too common and can make a company lose millions of dollars. To protect against this scam, a company must have the right protocols and software in place. What is a phishing attack? A phishing attack is a social engineering attack, where an attacker mimics a trusted company or person to steal private information such as login or financial data. These attacks usually come...
Blog

Is Your Enterprise Ready for the Latest LockBit Ransomware?

Ransomware is a pervasive and persistent threat. It comes in many different forms and guises and constantly evolves, making it very difficult for organizations to protect themselves. A current example of this can be found with the emergence of LockBit 3.0.LockBit 3.0 is the latest version of LockBit ransomware and has a range of new features, including Zcash payments and a bounty program. It's a...
Blog

How to Prevent Business Email Compromise Attacks

How can you prevent business email attacks? Is training enough? We'll walk you through solutions and tips to protect your enterprise email from these attacks. Why is business email compromise such a problem? Business email compromise (BEC) attacks are sophisticated scams that target specific individuals with believable emails asking for funds to be transferred. These attacks can cost a company...
Video

What's new in version 5.2 of the Clearswift Secure Gateway?

Get an overview of the new features found in the upcoming V5.2 release of the Secure Gateway and gain an understanding of the new features, which include a new phishing detection feed and support for IPv6 in the Secure Email Gateway.
Datasheet

Secure Email Gateway Cloud Sandbox

Upgrade your existing Fortra's Clearswift Secure Email Gateway (SEG) appliance with the next-gen Cloud Sandbox from Sophos. This network sandbox offers state-of-the-art machine learning to provide an additional layer of security against ransomware and targeted attacks, but without any more systems to manage.Enterprise-grade protection that’s deployable in minutes with seamless integration into the...
Datasheet

Using Fortra's Clearswift Secure Email Gateway Appliance to Enhance Data Security in Microsoft 365

For many organizations, Microsoft 365 is the ideal collaboration tool, providing a convenient platform for employees to share information and communicate daily. Microsoft offers different tiered packages to suit a variety of customer requirements. Its Microsoft 365 E5 package provides platforms for mid- and larger-sized enterprises, with the lower-tiered packages (e.g., E1 and E3) offering fewer...
Datasheet

Clearswift URL Filtering

General Features Categorizing 99.9% of the active web, enabled by a Global Feedback Network of hundreds of millions of users worldwide More than 55 million sites categorized with 10 million new sites added and 10 million dead sites removed each year Coverage representing billions of web pages from around the world Over 100 categories using automated categorization technology (machine...