Part 2: What is a Retention Policy for Emails?
An effective email retention policy helps manage several risks by retaining email messages for a period aligned with ongoing electronic discovery (eDiscovery) cases and government regulations. According to a 2015 study by the Rand Institute for Civil Justice, complying with...
How to Stop Whaling Attacks
Whale phishing attacks include social engineering tactics, fraudulent messages, and websites disguised as real and urgent. The whale messages appear to be critical business emails from someone within a c-suite executive role who is legitimately qualified. Cloud-based advanced email security...
Simplifying Email Encryption : NRHC
Who is Northeastern Rural Health Clinics? NRHC is the largest provider of outpatient care to Lassen County. We currently provide over 50,000 patient visits per year, covering primary care, obstetrics, urgent care, dental services, health/nutrition/childbirth education, and the Women, Infants,...
How to Recover from an Email Phishing Attack
Recovering from any attack, cyber or otherwise, is a journey, always challenging to accomplish in a few steps. Organizations affected by email phishing attacks become concerned in several areas within their enterprise, including Data Exfiltration Identity Theft Disruption of Business...
Trustifi’s Anti-Bot Detection Stops Targeted Attacks Shrouded Inside of Known Global Sites
Over the past several weeks, Trustifi has identified an increase of 250%-300% in email attacks from hackers that impersonate the targeted campaign while they shrouded themselves inside known global sites (AWS/YouTube/Google Translate) to host their malicious links. This combination is...
What is Fileless Malware, and How Can It be Stopped?
Fileless malware attacks computers with legitimate programs that use standard software. This challenging malware lives in Random Access Memory space, making it harder to detect. Users clicking on malicious files or downloading suspicious attachments in an email will lead to...
Why do Employees Continue To Fall for Phishing Attacks?
Phishers use increasingly sophisticated techniques with phishing scams to trick their victims into giving up personal details by sending legitimate emails first in the attack chain. Google detects about 17 million phishing emails every month, with most of them targeted...
Email Security for Education
Many educational institutions possess highly critical research data and financial donation information. Many middle schools, High schools, and higher education receive donations from public corporations and private citizens. Protecting this information is critically important the schools and universities. Educational Attack...
What is Reverse Social Engineering & How Does It Work?
Reverse social engineering involves human interaction, sabotaging, advertising, and intimidating people. Social engineers start by finding ways to disrupt a network through psychological manipulation and suspicious activities. Reverse social engineering attacks can be as complex as performing a denial-of-service attack...
WannaCry Ransomware Attacks Propagating Through Email I Case Study
WannaCry ransomware was discovered in 2017, infecting hundreds of thousands of computers globally. It targeted a critical security vulnerability of Microsoft operating systems. A malware codename EternalBlue created by the NSA leaked in April 2017, was used by WannaCry’s developers...