4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between October 2018 and M… Continue reading 4 Phishing Protection Gaps that SEGs Cannot Address

Must-See Webinar: Real-Time Phishing Threat Intelligence

Social engineering is the malicious act of tricking or manipulating people into divulging something. …
The post Must-See Webinar: Real-Time Phishing Threat Intelligence appeared first on SlashNext.
The post Must-See Webinar: Real-Time Phishing Threat… Continue reading Must-See Webinar: Real-Time Phishing Threat Intelligence

Must-See Webinar: Real-Time Phishing Threat Intelligence

Social engineering is the malicious act of tricking or manipulating people into divulging something. …
The post Must-See Webinar: Real-Time Phishing Threat Intelligence appeared first on SlashNext.
The post Must-See Webinar: Real-Time Phishing Threat… Continue reading Must-See Webinar: Real-Time Phishing Threat Intelligence

Aberdeen Report Reveals the Need for Speed in Phishing Attack Prevention

Late last year we reported in our 2018 Phishing Survey results that there is …
The post Aberdeen Report Reveals the Need for Speed in Phishing Attack Prevention appeared first on SlashNext.
The post Aberdeen Report Reveals the Need for Speed in Phish… Continue reading Aberdeen Report Reveals the Need for Speed in Phishing Attack Prevention

Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense

Staying ahead of phishing attacks is, and likely will always be, an uphill battle. …
The post Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense appeared first on SlashNext.
The post Two-Factor Authentication (2FA) is Just… Continue reading Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense