Email Vendor Consolidation: Making Your Customers Less Vulnerable to Security Attacks
INKY Blog
by
4d ago
There is a lot of talk about vendor consolidation these days, and with good reason. When it comes to email security, the more vendors your customers have, the greater their risk ..read more
Visit website
Top Threat Categories in Phish
INKY Blog
by
1w ago
Phishing threats continue to be the most frequently used form of cybercrime, accounting for 34% of all complaints received by the FBI’s Internet Crime Complaint Center (IC3).1 This means costly troublefor individuals and businesses alike. For those wondering how phishing maintains its top position each year, the most obvious reason is because the landscape is constantly changing ..read more
Visit website
Fresh Phish: Leveraging Legitimate Adobe and Constant Contact Tools in a Multi-Layered Phishing Attack
INKY Blog
by
1M ago
Looking for the tell-tale signs of a phishing email is something many of us have come to do automatically. However, things get much trickier when the phishing emails come in the form of legitimate Adobe notifications, have been authenticated (SPF & DMARC) by adobe[.]com, and use actual Constant Contact tools as part of their approach. Even with these legitimate elements in place, phishers took this latest phishing scheme to a whole new level, layering on additional (and we mean lots of additional) phishing tactics to achieve maximum results ..read more
Visit website
Highlights of INKY's Annual Email Security Report 2023-2024
INKY Blog
by
1M ago
The State of Email Security If there is one thing about email security and phishing that you can count on, it’s cybercrime’s consistent upward climb. Year after year, phishers are improving their skills - devising more complicated phishing threats, designed to slip by Secure Email Gateways (SEGs) and fool recipients. In 2023, INKY uncovered numerous new and dangerous phish that are sure to continue into 2024. Thankfully, with each phishing catch, INKY grows smarter ..read more
Visit website
The 10 Most Phished Brands of 2023
INKY Blog
by
3M ago
Whether it’s your favorite streaming service, or the laundry detergent that smells like your childhood, we all have our go-to brands. Why? Because the brands we love stand for something. They make our life better. They have value. They’re also familiar – we can recognize their logo instantly ..read more
Visit website
Stay Compliant, Consistent, and Secure with INKY’s Email Signatures
INKY Blog
by
5M ago
We all have one, so call it what you will. Your John Hancock, autograph, inscription, endorsement, seal, scrawl, or our favorite…your ink(y). It’s more than just a few lines on a paper. Whether it’s the curve of your letters or the middle name that’s carried through your family for decades, your signature is an important part of who you are. The same is true in a professional setting. With each message you send, your reputation is on the line. The right signature line not only lets people reach you, but it can connect them to the brand and messaging you so passionately represent ..read more
Visit website
Zombie Phish Are Coming For You
INKY Blog
by
6M ago
Trick-or-Treat. Hack Complete. Account Takeovers Are Tough to Beat.   ..read more
Visit website
Fresh Phish: Streaming Platforms Are Targeted by Bad Actors Amid the Real Actors’ Strike
INKY Blog
by
6M ago
Hollywood’s writers and actors have been feeling the financial pinch since both groups went on strike back in July. After five long months, Hollywood writers have finally returned to work, but the only actors who have been bringing home a paycheck are the bad actors ..read more
Visit website
Sharpen Your Phish Spotting Skills During National Cybersecurity Awareness Month
INKY Blog
by
6M ago
October is National Cybersecurity Awareness Month. It’s a time we are all called to consider our role in staying safe online, especially when it comes to the #1 source of cybercrime - email phishing. The volume of phishing emails has been increasing in strength for years. In fact, it’s estimated that 3.4 billion phishing emails are sent out each day, worldwide.1 ..read more
Visit website
A Shared Checklist of Proactive Measures for Cyber Resiliency and Security
INKY Blog
by
6M ago
When it comes to educating customers on the key elements of cybersecurity, every Managed Service Provider (MSP) has their own approach. Whether you stick to basic detection, protection, and recovery issues, or leverage recent cyber-catastrophes to spark a conversation, it’s always helpful to gain a different perspective ..read more
Visit website

Follow INKY Blog on FeedSpot

Continue with Google
Continue with Apple
OR