ALL NETS HAVE HOLES

June 9, 2019

90% OF VERIFIED PHISHING EMAILS WERE FOUND IN ENVIRONMENTS USING SECURE EMAIL GATEWAYS (SEGS). This key finding1 in the CofenseTM Phishing Threat & Malware Review 2019 is based on research by the Cofense Phishing Defense CenterTM. From October 2018 to March 2019, our team verified over 31,000 malicious emails reported by customers’ users. This data is augmented below by findings from the Cofense Research and Cofense IntelligenceTM teams.

Spotlight

Surfright

Founded in 2006, SurfRight (http://www.surfright.com) is an innovator of online security, focused on developing new applicable technologies to fight malware, spam, phishing and other forms of cybercrime. SurfRight has years of specialized experience in removing sophisticated threats that have silently embedded themselves on systems that were deemed safe. With millions of users globally, its HitmanPro product family include content filtering and security solutions for computers and home networks.

Other Infographics
news image

Know the Use Cases of Biometric Technologies

Infographic | April 4, 2022

Biometrics is the most suitable means of identifying and authenticating individuals. It is reliable and fast because of the unique biological characteristics it uses.

Read More
news image

The future of cybersecurity in a digital world

Infographic | February 2, 2020

Data-driven technologies change the way the world works. And the more connected devices flourish, the more cybersecurity matters. There are more digitally connected devices than ever before—and the world is just getting started.

Read More
news image

Infographic: Is Your Software Vulnerable to Cybercrime

Infographic | February 13, 2020

Third-party support and self-maintenance can’t protect youthe real solution is at the source. Don’t be fooled by third-party support providers and self-maintenance security methods. Security patching is essential for securing enterprise software, including Oracle’s. If you don’t own the code, you can’t access or update it. That leaves your software open to attack and your business open to risk.

Read More
news image

Active directory IT security infographic

Infographic | January 24, 2020

Active Directory is a great technology. In fact I can’t image life without it. It’s pretty easy to set up, with every Microsoft Server release it gains additional options that make life for IT easier. Did you know that only 5% of 1000 fortune companies don’t use AD to organize their environment?

Read More
news image

CYBER SECURITY EXPOSURES INFOGRAPHIC

Infographic | January 16, 2020

It seems counterintuitive that cybercriminals would focus on small businesses. Major news outlets report on the largest incidents, which typically affect the largest companies. In the past, small businesses may have been able to neglect network security with little consequence, but this is not the case today. Small businesses generally have fewer IT resources and devote less time and money to cybersecurity than their larger counterparts.

Read More
news image

Social Engineering Attack Facts

Infographic | April 4, 2022

Social engineering attacks exploit human error to access credentials or spread malware using infected email attachments or links to malicious websites.43% of IT experts report that they have been victims of social engineering.

Read More

Spotlight

Surfright

Founded in 2006, SurfRight (http://www.surfright.com) is an innovator of online security, focused on developing new applicable technologies to fight malware, spam, phishing and other forms of cybercrime. SurfRight has years of specialized experience in removing sophisticated threats that have silently embedded themselves on systems that were deemed safe. With millions of users globally, its HitmanPro product family include content filtering and security solutions for computers and home networks.

Events