How Natural Language Programming help combat phishing and BEC attacks by John Stevenson Business Email Compromise (BEC) Business Email Compromise (BEC) covers a range...
Cyren Security Blog Categories
Using AI to protect against BEC attacks
With no payload to detect, how best can organizations protect themselves from Business Email Compromise and other social engineering attacks? by John Stevenson...
What is Microsoft Office 365 Advanced Threat Protection?
Office 365 Advanced Threat Protection (also known as ATP and Defender) can provide your organization with advanced security features - keeping you protected from...
Protect Office 365 Email from Ransomware
Ransomware is continually evolving. It has become the “most prominent malware threat”, with experts estimating that ransomware attacks in 2021 resulted in total damage...
What Are Office 365 Safe Attachments?
Office 365 Safe Attachments is a feature of Microsoft 365 Advanced Threat Protection (also known as Microsoft 365 Defender) that provides another layer of protection to...
Office 365 Phishing, BEC, & Ransomware Survey Highlights
by Max Avory Reading a complete report is not for everyone. If that includes you, here are the key takeaways from the 2022 Osterman report on Phishing, BEC, and...
Please Approve This Account Takeover
By Dexter See To The pandemic has changed the way we live, the way we work. The world is becoming increasingly digitized as more employees embrace a remote work model....
19 Best Practices for Securing Microsoft Office 365
Microsoft Office 365 is a massive platform that many businesses use. It is considered the world's most popular office suite of productivity tools. Unfortunately, this...
Cyren’s Email Security Engine for IP Reputation
The challenges of keeping unwanted network traffic outside of the network perimeter is never-ending. Spammers and hackers are continually evolving and changing their...