The healthcare industry is under attack. Ransomware is shutting down emergency rooms, fraudulent emails are defrauding patients, and attackers steal confidential medical data regularly.
Security awareness training helps organizations improve their security posture. Part of that training is enabling the next step after a user recognizes a phishing email—sending the suspicious email to an abuse mailbox. But what happens to an email forwarded to the abuse mailbox?
A company’s executives and offices are focal points for unhappy customers, activist groups, cybercriminals, and disgruntled employees who want to do harm. These risks to your executives and locations are difficult to manage without visibility.
Enterprise cloud adoption shifts the cybersecurity landscape for both attackers and the organizations they target. As data moves to the cloud cyber threats move with it, evolving their targets and priorities.
Why is email fraud—one of the oldest and most commonly known scams, where a fraudster spoofs a trusted identity in an effort to steal money or valuable information—still so pervasive today? You have likely heard of one of these email tricks that seem too unrealistic to be true and thought to your
One month and 20 days. You have one month and 20 days before the European Union’s General Data Protection Regulation (GDPR) comes into effect.
We’re pleased to feature Martin Littmann, the Chief Technology & Information Security Officer for Kelsey-Seybold Clinic, on the Proofpoint blog today. He is responsible for IT Architecture & Strategy, Infrastructure, and Information Security.
Email fraud, also known as business email compromise (BEC), is one of today’s most widespread cyber threats. These highly targeted, socially engineered attacks seek to exploit people rather than technology.
Last month, the Securities and Exchange Commission (S.E.C.) released new guidance for public companies that encourages senior leadership to prioritize cybersecurity and disclose security breaches and risks that may be relevant to in