Proofpoint

Displaying 1 - 10 of 18 results

  • State of the Phish

    White Papers · Apr 2019 · Provided By Proofpoint

    Proofpoint threat intelligence continues to demonstrate attackers’ focus on end users, and it validates the need to take a people-centric approach to cyber security. But what if organisations aren’t following that model? In this section of the report, you’ll find the results of our five-question, seven-country survey, which was designed...

    Read More
  • State of the Phish (German)

    White Papers · Apr 2019 · Provided By Proofpoint

    Proofpoint threat intelligence continues to demonstrate attackers’ focus on end users, and it validates the need to take a people-centric approach to cyber security. But what if organisations aren’t following that model? In this section of the report, you’ll find the results of our five-question, seven-country survey, which was designed...

    Read More
  • State of the Phish (French)

    White Papers · Apr 2019 · Provided By Proofpoint

    Proofpoint threat intelligence continues to demonstrate attackers’ focus on end users, and it validates the need to take a people-centric approach to cyber security. But what if organisations aren’t following that model? In this section of the report, you’ll find the results of our five-question, seven-country survey, which was designed...

    Read More
  • Email Fraud Threat Report

    White Papers · Apr 2018 · Provided By Proofpoint

    Email fraud, also known as business email compromise (BEC), is one of today's greatest cyber-threats. These socially engineered attacks seek to exploit people rather than technology. They are highly targeted, sent in low volumes and impersonate people in authority. Email fraud preys on human nature - fear, the desire to...

    Learn More
  • The State of Email Fraud Year in Review

    White Papers · Apr 2018 · Provided By Proofpoint

    Email fraud is one of today's greatest cyber threats. View this infographic to better understand the scope of the problem and the tactics used.

    View This Now
  • Stopping Email Fraud

    Ebooks · Apr 2018 · Provided By Proofpoint

    How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other non-malware threats.

    Read More
  • Email Fraud Survival Guide

    White Papers · Apr 2018 · Provided By Proofpoint

    Email Fraud attacks don't use malware, making them invisible to most email security tools. It's no wonder that more than 22,000 organisations have fallen victim since 2015—losing an estimated $3.08 billion (USD) in the process. Fortunately, you can protect your organisation from email fraud attacks. Our Email Fraud Survival Guide...

    Learn More
  • The GDPR Handbook

    White Papers · Oct 2017 · Provided By Proofpoint

    After years of negotiations, the European Union General Data Protection Regulation (EU GDPR) will come into effect on 25 May 2018, replacing the 22-year-old EU Data Protection Directive. At its core, the GDPR aims to put EU residents in control of their personal data. It regulates how their...

    Download Now
  • The Cost of Microsoft Office 365 Security and Compliance

    White Papers · Aug 2017 · Provided By Proofpoint

    So your organisation has decided to migrate to Microsoft Office 365. While you’ll likely benefit from its cloud collaboration capabilities, you might want to ask more about what Office 365 means for security, compliance and e-discovery.It’s no surprise that 91% of targeted attacks start with email....

    Let's Start
  • The Business Email Compromise Guide

    White Papers · Aug 2017 · Provided By Proofpoint

    Business email compromise (BEC) is a simple attack that is confounding some of the most advanced companies in the world. Since the FBI began tracking BEC attacks in 2015, more than 22,000 organisations worldwide have fallen victim to them, losing an estimated $3.08 billion. You can...

    Start Now