chat
expand_more

Q3 2022 Content Recap: 5 Blog Posts to Check Out

To help ensure you have the opportunity to read the latest cybersecurity news and updates, we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.
October 7, 2022

As part of our mission to help enterprises protect their employees from the full spectrum of email attacks, we're committed to being a trusted source of data and insights for the cybersecurity community.

Our blog posts explore the latest trends, discuss emerging threats, and offer valuable advice—all to help ensure security professionals have the information they need to keep their organizations safe.

To that end, we wanted to make sure you have the opportunity to read the latest news and updates, which is why we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.

The 4 Most Damaging Types of Financial Supply Chain Compromise

Starting in January 2022 (and continuing every month since), threat actors have impersonated third parties more than internal employees in business email compromise (BEC) attacks. Understanding the ways cybercriminals execute these sophisticated BEC attacks is key to preventing your organization from falling victim to one. Learn more about the four subsets of financial supply chain compromise.

Blocking Phishing Attacks Before Employees Bite

Credential theft opens the door to more damaging and costly attacks, which means taking steps to block phishing emails must be a top priority in 2022. Phishing emails are designed to evade traditional email security solutions, and modern threat actors use a variety of tactics to make them as convincing as possible. Discover what you can do to protect your organization.

Understanding and Preventing Account Takeover Attacks

Account takeover attacks are both relatively easy to execute and incredibly difficult for secure email gateways (SEGs) to detect. And once an account has been compromised, it can lead to invoice fraud, data breaches, and more—making account takeover possibly the most dangerous email-based threat. Learn how threat actors compromise accounts and what you can do to reduce your risk.

3 Essential Elements of Effective Graymail Management

The standard approaches to managing unwanted mail that rely on static rules and policies, spam digests, and quarantine portals are neither practical nor scalable. And ignoring the issue will only lead to overflowing employee inboxes, wasted time, and lower productivity. Discover how innovative organizations use an API-driven, AI-based approach to limit time-wasting promotional emails.

5 Crucial Cybersecurity Tips for Retailers

Retailers are popular targets for sophisticated attacks like business email compromise, supply chain compromise, and account takeovers. In fact, retailers have an 81% chance of receiving a business email compromise attack each week. And between 2018 and 2022, socially-engineered attacks targeting retail organizations increased by 123%. Learn five essential measures retailers should adopt to reduce their vulnerability to email attacks.

Sign up for our blog newsletter to get the latest blog posts delivered right to your inbox. Just enter your email address in the dark green box on the right side of the page.

Q3 2022 Content Recap: 5 Blog Posts to Check Out

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B 5 13 24 Docusign
Cybercriminals are abusing Docusign by selling customizable phishing templates on cybercrime forums, allowing attackers to steal credentials for phishing and business email compromise (BEC) scams.
Read More
B CRN
Abnormal employees honored as CRN 2024 Women of the Channel for their influential leadership in the tech industry.
Read More
B Verizon DBIR 2024
Verizon's 2024 Data Breach Investigations Report reveals the role of employees in creating opportunities for threat actors to infiltrate organizations.
Read More
B Forcepoint Blog Open Graph Images
Discover how the strategic partnership between Abnormal and Forcepoint provides joint customers with industry-leading DLP and inbound email protection.
Read More
B Expanding the Abnormal AI Platform Blog
Today, we're excited to announce new products, new features, and groundbreaking AI capabilities for existing products—all to provide even more value for our customers.
Read More
B Images for Extending Abnormal Protection and Visibility Blog
Abnormal is extending our visibility, control, and AI-native account takeover protection beyond the inbox to protect your cloud platforms and SaaS apps.
Read More