If You Want to Catch More Phish, Use More Hooks [Webinar]

Over the past 2 years, organizations have seen a huge uptick in the number of email compromise attacks. This increase has come mainly in the form of non-signature based attacks, such as name impersonations and domain lookalikes. The social engineering behind name and domain impersonations has become so sophisticated and well-targeted, that phishing attempts can be nearly indistinguishable from the real thing.

Don't Take the Bait: Avoiding Phishing Attacks at Work

Phishing schemes have been top attack vectors for the past several years; they are 'tried and true' methods that generally result in a high level of success for attackers, granting them access username and password details, bank accounts, social security numbers, email addresses, other sensitive information. As such, it is expected that the number of phishing attacks will soon surpass that of web-based application attacks.