Resources

Video

Get the Most from Your Secure Email Gateway

In this webinar, Alyn Hockey, VP Product Management, shows you how to get the most from your Clearswift investment by demonstrating the capabilities of the Secure Gateway.
Blog

New Research Shows 61% of Employee-Reported Phishing Emails are False Positives

A year into the pandemic, Security Operations Centers (SOCs) are getting bombarded by employee-reported phishing attacks both real and imagined—as legitimate threats slip by unnoticed, according to analysis from our latest cross-industry phishing response survey. Long before any of us had ever heard the term "COVID-19," phishing was implicated in nearly 7 in 10 corporate data breaches, prompting...
Blog

What is DMARC? Effects on Email Spoofing & Deliverability

Wondering how DMARC affects email? Here’s a comprehensive guide explaining what DMARC is, how it affects email, and why your company needs it for security.What is DMARC?What does DMARC mean? DMARC, short for Domain-based Message Authentication, Reporting and Conformance, is an email authentication protocol to help email administrators prevent fraudsters from spoofing email domains by specifying...
Blog

Newly-Enhanced Agari Splunk App Integrates Phishing Threat Data into Splunk SIEM Solutions

A newly-enhanced Agari App for Splunk integrates email threat data from both Cloud Email Protection and Agari DMARC Protection directly into Splunk SIEM, with support for Splunk Enterprise and Splunk Cloud. This comes at a pivotal time. We’re over a year into the pandemic, with an estimated 57% of corporate employees still working remotely and the prospect of transitioning to new, hybrid office...
Blog

Protecting Digital Communications During the Digital Transformation: A Look Back at Trust 2021

While we’re all Zoomed, Webexed and Teamed out after thirteen months of the pandemic, cybercriminals are taking advantage of the situation. They know we’re heavily relying on digital communications and they’re sending fake emails, pretending to be your boss. They’re sending fake invoices, pretending to be your vendor. They’re even sending fake requests for gift cards, on the off-chance that...
Blog

Agari Simplifies Microsoft 365 Integration & Delivers New Visibility into B2B Domain Abuse

Protecting employees, customers, and partners against email security threats is about to become simpler and more effective, thanks to new features in our latest product release. It couldn't happen at a more pivotal moment.According to a new report from the FBI's Internet Crime Complaint Center (IC3), 2020 was as bad as you thought it was. The number of reported email attacks against US companies...
Blog

Big Email Concern: IC3 Report Confirms that BEC (Unsurprisingly) Remains a Problem

When it comes to reports from the security industry, one of our yearly favorites is the IC3 Internet Crime Report, which covers all cybercrime reported to the FBI. Each year, the report provides breakdowns on the confirmed losses victims face across the globe. While the crimes are heavily focused in the United States, the FBI receives victim reports across the globe, giving a non-biased, non...
Blog

Stray Emails: How to Prevent a Critical Cyber Security Vulnerability

The pervasive threat that cybercriminals pose to the security of critical information has dominated media headlines over the past year. Major data breaches, from Uber’s data theft cover up to the 147.9 million American’s affected by the attack on Equifax, have shifted the focus to the damage cybercriminals can do to an organization. However, whilst cyber-attacks from external forces continue to...
Blog

DMARC 101 (Part II) – DMARC Fills the Holes Left by SPF and DKIM

You can catch up on Part 1 here.As we discussed in part one of this series, SPF and DKIM are important foundational standards for email authentication. But, even after an email sender has fully deployed SPF and DKIM, there are still three key elements of email authentication equation missing—and that's what led to the development of DMARC.#1: Which Matters More: SPF or DKIM?First, there is no way...
Blog

Public Sector Cybersecurity Priorities in 2021

The Covid-19 pandemic has undoubtedly changed working patterns for good. What are the implications for public sector organizations and what can they do to improve their cybersecurity posture?
Blog

DMARC 101 (Part I) – S/MIME, SPF, and DKIM

Why do you need DMARC to protect your email domains from being leveraged in phishing attacks? To get the full picture, let's look at the basics—and how DMARC came to be.What is DMARC?Domain-based Message Authentication, Reporting & Conformance, or DMARC, is an open email authentication protocol that helps senders protect their email domains from being spoofed by fraudsters in phishing attacks and...
Video

How to Enhance Data Loss Prevention in Office 365

In this webinar, Nick Hogg, Director of Technical Training, talks through the data risk challenges with Office 365 and looks at ways you can further protect your critical data and secure your installation from cyber threats.
Datasheet

Outlook Spam Reporter

With an ever growing need for secure business communication and collaboration methods, email still remains the primary means for most organizations to do business. However, the challenge for some organizations is how to communicate securely to their customers.Business ProblemEmail is a tool used by every business, unfortunately this also means that Email is also used by spammers and worse still...
Blog

5 Lessons The NHS Cyber-Attack Has Taught Us

Many of the UK’s National Health Service (NHS) Trusts have been taken back to pen and paper after Friday’s much publicized cyber-attack that saw IT systems infected with Ransomware and others taken offline to prevent infection.
Blog

BIMI: What It Is & Why It Matters to Email Security

Curious how BIMI can protect your email? I’ll explain what BIMI is, how it works, and how you can use it to protect your brand’s email communications.What is BIMI?Brand Indicators for Message Identification, or BIMI, provides a standardized method for businesses to showcase their brand logo next to the subject line of their authenticated emails so they stand out in crowded inboxes, with built-in...
Guide

Managing Cybersecurity Risk in the Supply Chain

In this guide we examine today’s expanding attack surfaces, look at real world supply chain attack examples and offer guidance on how to mitigate risk by incorporating a comprehensive cyber and data security strategy.
Video

Managing Supply Chain Cybersecurity Risk

Discover how Clearswift mitigates the risks associated with an organization’s supply chain while keeping business communications progressing.
Blog

Email Security: Agari Delivers a Whole New Level of Actionable Insight to Outpace Threat Actors

CISOs and their teams are about to get some serious performance enhancers in their high-stakes race against email security threats. According to the FBI, phishing campaigns, business email compromise (BEC) scams, and other advanced email attacks have resulted in $26 billion in business losses over the course of three years. Then 2020 happened. With 75 million corporate employees even now still...