Resources

Press Release

Response-Based Email Threats Targeting Corporate Inboxes Are The Highest Since 2020, According To Fortra's Latest Agari And PhishLabs Report

Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, during Q2 of this year. This is according to the latest Quarterly Threat Trends & Intelligence Report from Agari and PhishLabs, part of the Fortra cybersecurity portfolio.
Blog

How Data Security Solutions Fit into Your Cybersecurity Stance

An organization’s cybersecurity stance, or posture, is the current security status of all its hardware, software, services, information, networks, and service providers. But how can your organization put together a roster of best security solutions to fit into your cybersecurity stance?
News Article

7 Steps to Switch Your Organization to a Zero Trust Architecture

With so much information published on Zero Trust, it’s easy to see why organizations remain unsure about what it means, let alone move forward with adopting a framework. In this Help Net Security video, John Grancarich cuts through all the material and aligns it with the process recommended by NIST to create a Zero Trust Playbook.
News Article

Email Fraud Cyber Work Podcast Featuring John Wilson

John Wilson, Senior Fellow, Threat Research at Fortra features in this episode of Infosec’s Cyber Work Podcast. John covers all aspects of email fraud including business email compromise and phishing, and shares career tips and advice for budding threat researchers at all levels.
News Article

Forbes: 1 in 4 ID Theft Victims Had Thousands Of Dollars Stolen During The Pandemic. Here’s How To Keep Your Financial Info Safe

An alarming number of Americans say they experienced identity theft, or attempted identity theft, during the pandemic. Forbes contributor, Kelly Anne Smith takes a detailed look at identity theft and provides 5 tips on how to protect yourself from it. Featuring John Wilson , Senior Fellow, Threat Research. Originally published on Forbes Advisor . Excerpt: "The financial account fraud happened in...
Blog

Source Authentication for Email

This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise.
Blog

Modern Data Security for the Enterprise

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
News Article

Forbes: Common Online Scams and How To Avoid Them

From fake holiday home rentals to counterfeit medications, online scams are now an unfortunate common occurrence. Forbes contributor, John Wilson takes a detailed look at online scams and provides 5 ways to protect yourself from them. Originally published on Forbes Advisor . Excerpt: “Mary was lonely. The recently divorced mom of three was ready to dip her toe back into the Orlando, Florida...
News Article

Keeping Personal Data Secure

With the rise in phishing attacks and identify theft, Ciaran Rafferty, Managing Director, Email Security at Fortra looks at emerging trends and ways organizations can keep their sensitive data secure. He also provides an update on what to expect from Fortra in 2022.
Video

Zero Trust File Transfer Bundle

What happens to files after they are securely transferred to their end recipients? Our Zero Trust File Transfer Bundle helps you maintain control and security for files wherever they travel. Watch the video for a quick overview of how the bundle can easily encrypt and control file access.
On-Demand Webinar

How to Keep Sensitive Data Safe and Compliant

Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay vigilant. On top of protecting your data, it needs to be compliant which can be a daunting task - especially if your business transcends geographical boarders. Some of the most impactful regulations are General Data Protection Regulation (GDPR) and...