Annnnd you’ve guessed it, none of the parties had their DMARC policies configured to quarantine, let alone reject. Only three of the parties – Liberal Democrats, Labour and SNP had a valid DMARC policy, but would still need to tighten configurations to direct impersonated emails using the @libdems.org.uk email domain for example, into the spam/junk folder…Continue Reading: Major UK political parties vulnerable to phishing
Phishing
What’s the Value of your Email DNA?
Though cyber crime has been prevalent for years now, these criminals are becoming more savvy and more sophisticated in the types of attacks they’re launching at both individuals and businesses – and research suggests 90% of cyberattacks start with a phishing email. It is clear as day that more is needed than just training employees on these potential threats…Continue Reading: What’s the Value of your Email DNA?
A comedy of email errors
So given it’s early September, and the entire office is in a post-holiday coma, we thought we’d break the monotony of the perpetual cyber doom media cycle and distract you with a few of our favourite ludicrous scams and subsequent responses…Continue Reading: A comedy of email errors
Incoming and outgoing email: you just need to secure it all
How can you assure recipients that the emails that are sent from @yourdomain.com are actually from you and not from an opportunistic scammer impersonating your currently reputable brand?…Continue Reading: Incoming and outgoing email: you just need to secure it all
Anti-phishing training: is it enough?
Cybercriminals have always exploited human weakness to successfully execute cyber attacks. Ask any vendor what the weakest link in the chain was 15 years ago and they’d offer the human up for sacrifice…Continue Reading: Anti-phishing training: is it enough?
The many guises of a phishing attack
News this week that highlighted the canny nature of scammers made us wonder whether we needed to start a glossary of phishing attacks. These attacks now come in many guises, and if you’re a computer user that isn’t privy to an underground network of caught-in-the-wild attack loggers, you may easily fall victim to one of…Continue Reading: The many guises of a phishing attack