Blog
E-mail Compromise: How to Protect Business Against BEC-attacks
27.09.2023
The senior analyst at SearchInform, Sergio Bertoni reveals, why BEC attacks are so popular and how to protect against them.
What Are the Major Security Threats That Can Be Expected Through an Email?
07.11.2022
Typical email threats and how to counter them
How to tell the difference between a phishing email and a real one?
07.10.2021
Don't become a phisher’s target, it's avoidable.
Social engineering prevention
20.05.2020
When cyber criminals target organizations, their target normally is people themselves, because they can be manipulated. 70 to 90 percent of data breaches occur as a result of social engineering.
Email monitoring
04.09.2019
As much as companies try to foster a culture of positivity in the corporate environment, put all sorts of system limitations in place, and emphasize strict company policy to keep employees from engaging in things they shouldn’t be doing, fraud still goes on, and it is rampant, hence the demand for email monitoring.
Using personal mailbox
05.04.2019
A car center employee was caught sending sensitive data from corporate to personal email.
Attempt to leak tender documentation
20.03.2019
The results of the monitoring revealed that the employee was ordered to send the document to this email address by his manager.