email

August 6, 2019

SECURITY

How to Save a Billion Dollars

In my last blog, I examined the state of cybercrime, fraud, and the losses associated with it. It was also in that blog that I brought up a particular threat that has caused more than $1 billion dollars in losses last year and shows no signs of slowing down. So, what is this increasingly expensive a…

May 6, 2019

SECURITY

Cybercrime and Fraud Part 1: Modern Tales of Piracy and Plunder

Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy. Time will tell whether we see such romanticized stories of dashing rogues based on this new golden age of crimi…

April 18, 2019

SECURITY

Email – From Novelty to Nefarious

How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at times a nuisance, and now, to downright nefarious. “You’ve got mail” has somehow turned into “You’ve got malware.” Email has become and remains…

March 14, 2019

SECURITY

Your money or your life: Digital extortion scams

There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most phishing scams, they’re after your money, but it’s a departure from…

December 14, 2018

THREAT RESEARCH

Bitcoin Bomb Scare Associated with Sextortion Scammers

Organizations across the country are on edge today after a flurry of phony bomb threats hit several public entities Thursday, such as universities, schools and news outlets, among others. The attackers distributed malicious emails claiming to have placed some type of explosive materials in the recip…

December 13, 2018

SECURITY

You’ve Got (Compromised) Mail!

There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with BEC. It’s happening all the time, in your company, right now. People are getting emails that look official, from a realistic company ema…

July 26, 2018

SECURITY

Don’t Feed the Phish: Implementing DMARC

The Challenge of implementing SPF and DKIM It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not been widely adopted. However, organizations must take advantage of them to tackle two of the most pressing email securi…

July 12, 2017

FINANCIAL SERVICES

4 Ways Collaborative Technology Can Lead to Happier Bank Employees

  In established companies, people are the biggest cost—as well as the biggest asset. As banks compete for the best talent, many are realizing they need to re-examine the fundamentals of how they operate. Even traditional financial institutions built on top-down process and authority are lookin…

August 1, 2016

SECURITY

Attackers Evolve Tactics to Infiltrate Your Network via Email

Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam c…