Resources

Blog

Best Practices for Using Secure Encrypted Email in Business

Attackers increasingly use sophisticated methods to spy on your emails directly, which is why the very information contained therein needs to be encrypted. This is defense in depth, not only protecting your email from without but securing it from within.
On-Demand Webinar

Leveraging AI to Combat Email Attacks

In today's digital landscape, email remains a cornerstone of business communication, yet its ubiquity makes it a prime target for sophisticated attacks like BEC and brand impersonation. These attacks have a significant impact on financial organizations as they can lead to direct financial and reputational loss. While traditional email security measures help, many fall short. To combat this,...
Blog

Top Threats to Cloud Email Security and How to Mitigate Them

A summary of common threats faced by cloud email systems beyond malware and data breaches, this blog provides actionable tips and best practices for businesses to protect their email systems.
Blog

Email Protection Strategies for Modern Enterprises

Modern enterprises need to be able to identify the tactics being used by cybercriminals in email attacks, especially those leveraging advanced technologies like AI. Find out what's at stake and how today's email security solutions can help mitigate these evolving attacks.
Datasheet

Email Security Expert Services

Business ChallengeFortra’s cloud-based email security solutions allow you to stop and respond to BEC and phishing attacks on your employees and protect your customers. Fortra’s Customer Enablement and Support organization is committed to the success of its customers and works to ensure they achieve value through the deployment of our Email Security...
Blog

Harrowing Tales of Social Engineering Attacks from the Trenches

The social engineering attacks that businesses are seeing today – from hiding payloads in files to commit fraud, to quishing and smishing – and what can be done about them.
Blog

Active Phishing Campaign: Twilio SendGrid Abuse

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. Sample Email Lure Sample 1: Vishing Example Sample 2: Office365 Phishing Example...
Blog

Active Phishing Campaign: Form Assembly Abuse

Active Phishing Campaigns are coordinated attacks that Fortra has observed bypassing email security gateways and filtering tools. The following analysis includes examples, high-level details, and associated threat indicators. To protect the privacy of Fortra’s clients, the brand targeted in this attack has been anonymized and is generically referred to as “Brand” whenever their name appears in the...
Blog

Harnessing Data Science and AI in Cybersecurity

In this Solutions Review article, Ravisha Chugh from Fortra explains how companies are harnessing data science and AI technologies in their cybersecurity initiatives.
Blog

Will 2024’s Presidential Election Day Be Groundhog Day When It Comes to Nation-State Email Attacks?

With 2024's presidential election around the corner, Fortra discusses the blunt-force impact of campaigns not hardening their cybersecurity, such as campaign impersonation, donation scams and fraud, and the possibility that it will be cybercriminals who decide the next President of the United States—not voters.
Blog

Understanding DMARC Reports

Why is it so important to analyze DMARC reports? Well, it makes it so organizations can detect malicious emails and prioritize source configuration, all of which is crucial for maintaining their email security.
On-Demand Webinar

Intro to Email Security Bundles

This webinar discusses how inefficiencies in combating phishing result in lost time and productivity for employees and internal SOC teams. Luckily, Fortra Email Security has introduced interoperable bundle packages that can stop advanced email threats over the entire lifecycle from pre-delivery staging to post-delivery remediation. Mike Jones outlines these bundle...
Blog

How to Defend Against Stegomalware

Stegomalware is still a relatively unknown term but is becoming more widely leveraged in malware. So you need to know about this semi-low-tech, yet innovative tactic that is imperceptible to the human eye.
Blog

What You Need to Know About Stegomalware

It all sounds like the stuff of Sherlock Holmes or “Mission Impossible”, but steganographic malware, or stegomalware for short, is a real thing that broadly describes a host of tactics used to hide data in plain sight.
On-Demand Webinar

Is Malware Using Steganography on Your Network?

As cyber threats become more evasive, technology that protects organizations must have the capability to look deeper into the content flowing in and out of an organisation's network. More and more, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or sensitive data out of networks. In this webinar, Dr. Steve Jeffery outlines...
Blog

How to Set Up DMARC: Step-by-Step Guide

Learn how to configure DMARC for your company’s email with a step-by-step guide. We’ll cover everything you need — from prerequisites to adding DMARC to your DNS — so you can secure your domain against email spoofing. Before we dive in, here’s a quick high-level overview of the process.Add your DMARC record into your DNSSelect the TXT record typeAdd the host value (see details below)Add the value...
Blog

Preventing Email Leaks in Business Environments

By understanding email data leaks, their value to attackers, and their root causes, organizations can stay savvy and set up the right tools to thwart many email-targeting attempts.