Email security

Blog post

Combating Email Spoofing with Cisco Email Security Forged Email Detection

In April we covered the description of Email Spoofing using Microsoft Outlook, but what about detecting and mitigating it on the Mail Transfer Agent (MTA)? There are multiple technologies that have attempted to address the issues surrounding spoofed emails on the MTA, but they all have shortcomings that can limit their usefulness. DKIM, or Domain […]

October 18, 2016 2 min read
Blog post

Attackers Evolve Tactics to Infiltrate Your Network via Email

Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]

August 1, 2016 3 min read
Blog post

Protect against today’s attacks with AsyncOS 10.0 for Cisco Email Security

New email security release adds spoofing protection, auto-remediation of malware for Office 365 customers, AMP Private Cloud, and more. There’s been a spike in ransomware and spear-phishing attacks in the last several months. Read any news outlet and you’ll find examples of health records and other valuable data being locked up, employees duped into releasing […]

June 21, 2016 2 min read
Blog post

What is Email Spoofing and How to Detect It

What is Email Spoofing? Email spoofing is the creation of email messages with a forged sender address for the purpose of fooling the recipient into providing money or sensitive information.  For example: a sender 401k_Services@yourcompany.com sends a message to your business email address stating that you have one day to log into your account to take […]

April 5, 2016 3 min read
Blog post

New Email Security Release Adds Graymail Protection, Web Interaction Tracking, AMP Threat…

Each day more than 100 billion corporate email messages are exchanged1. Who doesn’t need to do a little housekeeping and eliminate unwanted emails? But you need to think twice before you click on “unsubscribe.” As you likely read in the 2015 Cisco Annual Security Report, attackers are using applications users inherently trust or view as benign, […]

May 28, 2015 2 min read