chat
expand_more

Q3 2022 Content Recap: 5 Blog Posts to Check Out

To help ensure you have the opportunity to read the latest cybersecurity news and updates, we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.
October 7, 2022

As part of our mission to help enterprises protect their employees from the full spectrum of email attacks, we're committed to being a trusted source of data and insights for the cybersecurity community.

Our blog posts explore the latest trends, discuss emerging threats, and offer valuable advice—all to help ensure security professionals have the information they need to keep their organizations safe.

To that end, we wanted to make sure you have the opportunity to read the latest news and updates, which is why we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.

The 4 Most Damaging Types of Financial Supply Chain Compromise

Starting in January 2022 (and continuing every month since), threat actors have impersonated third parties more than internal employees in business email compromise (BEC) attacks. Understanding the ways cybercriminals execute these sophisticated BEC attacks is key to preventing your organization from falling victim to one. Learn more about the four subsets of financial supply chain compromise.

Blocking Phishing Attacks Before Employees Bite

Credential theft opens the door to more damaging and costly attacks, which means taking steps to block phishing emails must be a top priority in 2022. Phishing emails are designed to evade traditional email security solutions, and modern threat actors use a variety of tactics to make them as convincing as possible. Discover what you can do to protect your organization.

Understanding and Preventing Account Takeover Attacks

Account takeover attacks are both relatively easy to execute and incredibly difficult for secure email gateways (SEGs) to detect. And once an account has been compromised, it can lead to invoice fraud, data breaches, and more—making account takeover possibly the most dangerous email-based threat. Learn how threat actors compromise accounts and what you can do to reduce your risk.

3 Essential Elements of Effective Graymail Management

The standard approaches to managing unwanted mail that rely on static rules and policies, spam digests, and quarantine portals are neither practical nor scalable. And ignoring the issue will only lead to overflowing employee inboxes, wasted time, and lower productivity. Discover how innovative organizations use an API-driven, AI-based approach to limit time-wasting promotional emails.

5 Crucial Cybersecurity Tips for Retailers

Retailers are popular targets for sophisticated attacks like business email compromise, supply chain compromise, and account takeovers. In fact, retailers have an 81% chance of receiving a business email compromise attack each week. And between 2018 and 2022, socially-engineered attacks targeting retail organizations increased by 123%. Learn five essential measures retailers should adopt to reduce their vulnerability to email attacks.

Sign up for our blog newsletter to get the latest blog posts delivered right to your inbox. Just enter your email address in the dark green box on the right side of the page.

Q3 2022 Content Recap: 5 Blog Posts to Check Out

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B Convergence S2 Recap Blog
Season 2 of our web series has come to a close. Explore a few of the biggest takeaways and learn how to watch all three chapters on demand.
Read More
B 1500x1500 Adobe Acrobat Sign Attack Blog
Attackers attempt to steal sensitive information using a fraudulent electronic signature request for a nonexistent NDA and branded phishing pages.
Read More
B 4 15 24 RBAC
Discover how a security-driven RBAC design pattern allows Abnormal customers to maximize their user setup with minimum hurdles.
Read More
B 4 10 24 Zoom
Learn about the techniques cybercriminals use to steal Zoom accounts, including phishing, information stealers, and credential stuffing.
Read More
Social Images for next Cyber Savvy Blog
Explore how Alex Green, the CISO of Delta Dental, safeguards over 80 million customers against modern cyber threats, and gain valuable insights into the cybersecurity landscape.
Read More
B Images for EDB Blog from Sanjay
Abnormal is excited to announce the establishment of a strategic partnership with the Singapore Economic Development Board (EDB).
Read More