Microsoft says intruders targeting its email services had access to email content for a single-digit percentage of the overall affected accounts, a more serious conclusion than first thought. But the company hasn't released many details, including the total number of accounts affected.
The healthcare sector was the No. 1 target for major data breaches last year, according to a new report. And the No. 1 cause of breaches in all sectors was phishing. What can be done to prevent these incidents?
Spear phishing is among the most dangerous cyberthreats - and the most difficult to detect. Not long ago, C-level executives were the sole target. Today, any person at any company is at risk of receiving targeted emails attempting to trick them into completing wire transfers, purchasing gift cards or fulfilling other...
When a company plans to make an acquisition, it should conduct a "compromise assessment" to assess whether the organization being purchased has had an undiscovered breach, says Steve Ledzian, CTO for Asia Pacific at FireEye.
Microsoft is using its legal muscle to push back against an advanced persistent threat group that is says is "widely associated with Iranian hackers." Following court approval, it is taking control of 99 website domains allegedly used by the attackers as part of an ongoing spear-phishing campaign.
Guarding against threats targeting end users is among the top security priorities this year at a large group of surgical centers in Washington state - and artificial intelligence could play an important role, says CIO Curt Kwak of Proliance Surgeons.
A new generation of cybercriminal organizations that pair identity deception techniques with personalized, socially-engineered emails are the driving force behind rapidly-evolving, socially-engineered email threats that grow more dangerous by the day.
Businesses aren't alone in the crosshairs. Every minute of the...
Office 365 provides a solid foundation to which many organizations should add third-party solutions in order to provide higher levels of security, content management, encryption and other capabilities.
Download this Osterman Research report and learn about Office 365's:
Limitations in data loss prevention...
Business email compromise attacks are becoming far more common in the healthcare sector, says Rod Piechowski of the Healthcare Information and Management Systems Society, who discusses promising technologies to help address the threat.
This Valentine's Day, authorities are once again warning individuals to watch out for anyone perpetrating romance scams. The FTC says Americans lost $143 million to romance scams in 2017, while in the U.K., Action Fraud says reported romance scam losses in 2018 topped $64 million.
Remote browser isolation eliminates both web-based threats such as drive-by-downloads and email-based attacks like phishing and ransomware. The technology removes the browsing process from the desktop and moves it to the cloud, effectively creating an "air gap" between the Internet and enterprise networks. Gartner...
Stay Ahead of Phishing Threats This Year
In volume and complexity, phishing attacks are getting worse. The Verizon Data Breach Investigations Report 2018 found that over 90% of breaches begin as phishing emails or other social engineering tactics.
To get ahead of the problem, download this eBook on phishing trends...