Business Email compromise (BEC), also known as Imposter Email, is an evolving threat designed to trick victims into thinking they received an email from the CEO or CFO (or any high up company leader). Such Imposter Emails typically ask the recipient for either a transfer of money out of the company or employee personally identifiable information such as W2 forms.
These threats are very targeted and rely on social engineering rather than malware. This is why Imposter Email often evades security solutions that look for only malicious content or behavior.
Be confident that modusCloud will provide a high level protection for small and medium-sized businesses — utilizing Proofpoint’s patented MLX™ machine learning technology ensuring business email is protected every second of every day.
Learn more on protecting your company from Business Email Compromise with modusCloud’s Targeted Attack Protection.
Many phishing schemes rely on what is known as a “malicious attachment” to infiltrate a company’s corporate network.
Since most email servers automatically block nefarious programs, attackers attempt to conceal threats via an attachment, and include a prompt in the email that encourages you to open the attachment. Unfortunately, unsolicited attachments are often packed with malware, capable of disseminating a virus. One of the more severe evolving threats is a malicious attachment containing ransomware.
Learn more about modusCloud’s Attachment Defense.
Domain spoofing functions as a mask that scammers hide behind to fool email servers that automatically filter out dubious senders.
Spoofing has a pretty low success rate; however, it can be very damaging for a company’s brand and the trust that brand is meant to instill.
Our products include security mechanisms such as DKIM (DomainKeys Identified Mail) and SPF (Sender Policy Framework) to help prevent spoofing of your domain.
In an increasingly connected world where users are spread across multiple email accounts, social media profiles and devices, phishing has become a productive method for hackers seeking sensitive information such as usernames, passwords and credit card details.
Spear phishing tends to be a little more targeted, while Whaling is when the target is someone very high with many means and privileges.
Unfortunately, half of people will take the bait. A recent study by Friedrich-Alexander University (FAU) shows that over 50% of people will click on an unknown link out of curiosity in a simulated phishing scam. You’re thinking that you would never do that, but you know very well that some of your staff will…
Office macros, so useful when used properly, so painful when used improperly by hackers. Vircom’s modusCloud leverages the same technology that powers our Targeted Attack Protection solution
Intelligence gathered by the dynamic malware analysis component is used to identify and block malicious attachments that are designed to evade traditional security solutions. These attachments, such as Microsoft Office documents, are often used in spear phishing attacks, to deliver banking Trojans, ransomware, or other types of malware.
Learn about modusCloud Attachment Defense.
Simple but powerful outbound email filtering protects your company’s intellectual property.
With granular control, modusCloud allows you to enforce custom and regulatory driven policies to encrypt or protect information that may be leaked through email. You may choose to be notified if something escapes, or you may want to block it, or may be certain types of information must be automatically encrypted.
Learn more about Data Protection.
Malware, a melding of the words ‘malicious’ and ‘software’, is precisely what its name implies. It is hidden or embedded in non-malicious files and is used by hackers to attain a target’s sensitive personal, financial or business information as well as gain access to private computer systems. Or sometimes it’s just there to cause annoyance and disrupt your daily work.
Vircom’s modusCloud has the scale, visibility and elasticity for malware analysis with global and immediate benefit to all organizations for emerging campaigns, and includes proprietary technology to defeat malware through counter evasion techniques.
Learn more about modusCloud.
Whether you’re an SMB with a one person IT
department, an IT reseller or Managed Service
Provider, Vircom delivers the tools, flexibility
and support to deliver SLA-backed security for
today’s data-centered businesses.
Talk to us to see how we can work together.