Blog - SearchInform

Blog

E-mail Compromise: How to Protect Business Against BEC-attacks

27.09.2023

The senior analyst at SearchInform, Sergio Bertoni reveals, why BEC attacks are so popular and how to protect against them.


Email Fraud Risk assessment

What Are the Major Security Threats That Can Be Expected Through an Email?

07.11.2022

Typical email threats and how to counter them


Email ransomware

How to tell the difference between a phishing email and a real one?

07.10.2021

Don't become a phisher’s target, it's avoidable.


Email Risk management Personal data

Social engineering prevention

20.05.2020

When cyber criminals target organizations, their target normally is people themselves, because they can be manipulated. 70 to 90 percent of data breaches occur as a result of social engineering.


Email Risk assessment Human factor

Email monitoring

04.09.2019

As much as companies try to foster a culture of positivity in the corporate environment, put all sorts of system limitations in place, and emphasize strict company policy to keep employees from engaging in things they shouldn’t be doing, fraud still goes on, and it is rampant, hence the demand for email monitoring.


Email Human factor Fraud

Using personal mailbox

05.04.2019

A car center employee was caught sending sensitive data from corporate to personal email.


Email Confidential documents Risk management

Attempt to leak tender documentation

20.03.2019

The results of the monitoring revealed that the employee was ordered to send the document to this email address by his manager.


Email Confidential documents Investigation

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.

هل ترغب بالانتقال الى الصفحة الرئيسية,
او التعرف على المزيد عن الخدمات لمنطقة الشرق
الاوسط و شمال افريقيا؟
Do you want to visit main website
or learn more about MSS for MENA market?