Blog Phish of the Week: GigaOm’s playbook for preventing phish

A Playbook for Preventing Phish

As we witnessed in the Big Game, the team with the best defense ultimately wins (added bonus if you have the GOAT). Breaches in your defense = 31 points ceded to the opposition; or, in the case of email security, potentially millions of dollars in losses.

But how should you select the best email defense for your organization? As GigaOm Research analyst (and former Bloomberg CISO) Simon Gibson points out in the new Radar for Phishing Prevention and Detection“An effective anti-phishing solution must be a critical component of your enterprise security strategy. Vendors in the market today tackle this challenge in a variety of ways.”

So, here’s some guidance to tackle your email security challenges: the GigaOm Radar is an in-depth and independent, 22-page playbook that evaluates vendors on an extensive set of criteria ranging from deployment models, to analytical tools, to efficiency, to manageability/ease of use — and more.

The punchline? Area 1 scored favorably across all key criteria, and was positioned as an Outperformer both in product & technical innovation — as well as business value — compared to the rest of the solutions. We are extremely proud of our position in this marketplace and continue to push the envelope in the fight against Phishing.

Learn more by downloading your copy here (20 min).

BEC, SolarWinds and You: What to Know

Last week, SolarWinds’ CEO officially disclosed that the company’s major breach was caused by a single, compromised email account. Yes: that one, initial compromise ultimately put 250 other organizations at risk.

You can’t afford to be the next accidental victim of a SolarWinds-like supply chain breach. And the most effective way to prevent fraud from a compromised vendor or supplier is to proactively identify and intercept all four types of Business Email Compromise (BEC) phishing.

Read our new BEC ebook to learn more (7 min).

SC Media Webinar: Prevent Supply Chain Email Attacks

For an interactive session on how to “Prevent Supply Chain Email Attacks,” join SC Media and our threat research experts on Feb. 24th for a live webcast/Q&A.

You’ll dive deeper into:

  • The seven common supply chain-based attack methods;
  • Real examples of supply chain phishing attacks and the methods attackers use at every step of the cyber kill chain;and
  • The advanced, cloud-native email security techniques that proactively block these attacks.

Join us on Feb. 24th here (60 mins).

Want to keep up to date with the latest phishing trends? 

Subscribe to our newsletter here!

 

Shalabh

Shalabh Mohan

VP, Product at Area 1

With a career spanning 20 years fighting bad guys online, Shalabh leads all product and go-to-market functions at Area 1 Security, with extensive prior experience across security, enterprise, and cloud infrastructure companies such as Aspen Networks, IronPort Systems, Cisco and Bracket Computing. Shalabh and his teams have taken products from conception all the way to large scale businesses; and in the process have consistently helped make the Internet a safer place. An alumnus of Stanford University and the University of Texas at Austin, Shalabh holds five patents and can claim to know something about enterprise infrastructure and security.