When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we’ve got and do our best to educate employees about potential social media attacks.

The post When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current appeared first on Security Intelligence.

Continue reading When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security

While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.

The post Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security appeared first on Security Intelligence.

Continue reading Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security

Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Researchers have discovered evidence of a threat group named London Blue, a U.K.-based collective that focuses on CFOs at mortgage companies, accounting firms and some of the world’s largest banks.

The post Why You Should Be Worried About London Blue’s Business Email Compromise Attacks appeared first on Security Intelligence.

Continue reading Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Here’s Why Business Email Compromise Is Still Driving Executive Identity Theft

Business email compromise scams are still surprisingly lucrative. In fact, the volume and frequency of BEC attacks have skyrocketed in recent years, according to FBI data.

The post Here’s Why Business Email Compromise Is Still Driving Executive Identity Theft appeared first on Security Intelligence.

Continue reading Here’s Why Business Email Compromise Is Still Driving Executive Identity Theft

Email Security Best Practices to Help You Reel In the Threat of Phishing

Phishing is still among the most common causes of a data breach. Companies should invest in managed security services and comprehensive awareness training to improve email security best practices.

The post Email Security Best Practices to Help You Reel In the Threat of Phishing appeared first on Security Intelligence.

Continue reading Email Security Best Practices to Help You Reel In the Threat of Phishing

How to Recognize a Business Email Compromise Attack

Security leaders must implement phishing awareness programs to train employees to recognize business email compromise (BEC) attacks and other social engineering schemes that could compromise data.

The post How to Recognize a Business Email Compromise Attack appeared first on Security Intelligence.

Continue reading How to Recognize a Business Email Compromise Attack

IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies

IBM X-Force IRIS observed a widespread business email compromise (BEC) campaign targeting many Fortune 500 companies that exploits flaws in common accounts payable processes.

The post IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies appeared first on Security Intelligence.

Continue reading IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies

Why Device ID May Not Be Enough to Stop Fraud

To defeat increasingly sophisticated fraudsters, security teams should pair their fraud detection tools with a device ID spoofing mechanism that automatically adapts to new threats.

The post Why Device ID May Not Be Enough to Stop Fraud appeared first on Security Intelligence.

Continue reading Why Device ID May Not Be Enough to Stop Fraud