Automated incident response – efficiency at scale
No matter how robust your email security measures are, some threats will inevitably bypass initial defenses. Whether it’s a sophisticated phishing attack or an emerging malware variant, the ability to swiftly detect and respond to post-delivery threats is critical for...
’Tis the season to avoid holiday email scams
Beware of common holiday email scams. As the holidays approach, businesses are busier than ever, and cybercriminals know it. Along with cheer, joy, and giving, the holidays also bring an unfortunate surge in cyber scams. As businesses tackle everything from...
The rise of AI-based BEC attacks
Cybercriminals are quickly latching on to new technology and strategies to improve the success rates of their social engineering-based email attacks. In the latest Barracuda Email Threats and Trends report, the company found that although traditional email scams like phishing are...
Threat Spotlight: How company size affects the email threats targeting your business
It takes less than a minute for someone to fall for a phishing scam. According to the 2024 Data Breach Investigations Report, the median time for a recipient to click on a malicious link after opening the email is 21 seconds, followed by...
QR code phishing: What MSPs need to know to protect their customers
In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...
Five ways cybercriminals use AI to wreak havoc
It seems that each time there is a new technology advancement, criminals quickly cut to the front of the line when it comes to dreaming up new applications. That is the case with generative artificial intelligence (AI), which has been...
The three email threat types that are hardest for users to detect
There’s a question that all organizations need to be asking themselves when it comes to securing their email security posture: Do my users know how to distinguish between a legitimate email and an email threat? Some businesses are able to invest...
Email-borne attacks hit energy and utilities harder than most other sectors
The energy and utilities industry is part of the world’s critical infrastructure. Without reliable access to electricity, natural gas, renewables, water supplies, and more, many things we rely on will grind to a halt with potentially devasting consequences for companies,...