This is how much spear phishing costs companies

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Mar 07, 2016
Featured Image

Three more firms hit by targeted Phishing attacks seeking W2 data

It's happened again. Scammers have leveraged Phishing to gain access to W2 information at several firms, including technology powerhouse Seagate. No company is immune to these types of social attacks, and organizations both large and small have become victims to a finance-based scheme that has a long reach. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

This is how much spear phishing costs companies
Threat intelligence programs lack context experts say
CISOs should take security training seriously

White Paper: Brocade Communications Systems Inc

Forrester: Conquer Business-Critical Workloads with Dedicated Storage Networks

While business-critical workloads are very difficult to predict -- the one certainty is that they are increasing. This study shows how improving app workload performance reduces downtime, and makes for happier customers and more efficient staff. Read More

Thumbnail Image
INSIDER

This is how much spear phishing costs companies

New research from messaging security provider Cloudmark and technology research company Vanson Bourne finds that despite spending an average of $319,327 on spear phishing prevention in the past 12 months, an estimated 28 percent of attacks are getting through and are costing companies dearly. (Infographic included.) Read More

Thumbnail Image

Threat intelligence programs lack context experts say

This week during the annual RSA conference in San Francisco. For most attendees, threat intelligence will be this year's topic of interest. Unfortunately, most of what's being sold as threat intelligence isn't very smart, and organizations are paying hand over fist for data they can find in their own logs. Read More

Thumbnail Image

CISOs should take security training seriously

Security awareness training is pivotal to your organization’s information security posture, and, now, it’s more important than ever before. Read More

Video/Webcast: Ixia

ThreatARMOR - Your New Front Line of Defense

Reduce your attack surface with a security solution that sits in front of other security devices to provide dual-function protections: 1) Blocks traffic from known IP addresses; and 2) Blocks outbound bot communication from pre-existing infections. Read More

Top 5 Stories

1. Latest attack against TLS shows the pitfalls of intentionally weakening encryption
2. The FBI should try to unlock a shooter's iPhone without Apple's help, a lawmaker says
3. Cisco issues critical patch for Nexus switches to remove hardcoded credentials
4. RSA: Geolocation shows just how dead privacy is
5. Next-generation endpoint security tools ready to replace antivirus

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.