Cyren logo

Cyren Newsletter | February 2019

 
rawpixel-651365-unsplash.jpg
 

New Security Buyer’s Guides for Email and Office 365

Getting the right security means asking the right questions and understanding your real needs. For companies that have migrated to Office 365, or are planning to, the choices available are many and especially confusing. Two new buyer’s guides are available for IT pros considering complementary security solutions:

  1. for companies using Office 365 and
  2. for companies using other email service(s)

These guides provide a framework for making the most informed decision in your evaluation process, complete with practical checklists and questions to guide your internal preparation and vendor evaluations.

 
 

Webinar: Top 5 Office 365 Phishing Kits

Have you noticed an uptick in phishing traffic reaching your company’s email users? In an upcoming webinar, Magni Sigurdsson, Cyren Senior Threat Researcher, will share the latest on the phishing-as-a-service phenomenon, go in-depth on the five most-used phishing kits for sale on the dark web and being used to target Office 365 users, and explain how both users and security systems can recognize them.

US & Canada Registration
European Registration
 

Cyren Blog Posts You Might Have Missed

 
Has the success of Microsoft Office 365 exacerbated the already complex task of purchasing email security? New Buyer’s Guides give a framework and provide a checklist to get it right.
 
Phishing emails targeting Office 365 customers are the top source of security breaches, according to survey data. In 2018, phishing officially became the top concern for IT and security managers who have deployed Office 365, having eked past ransomware according to a cybersecurity survey by Osterman Research.
 
 

More Live And Virtual Events Hosted By Cyren

 

On-Demand Webinar: Evasive Phishing Targeting Office 365

This on-demand webinar provides IT and security professionals the opportunity to understand the phishing phenomenon as applied to Office 365, and to apply lessons learned to the security strategy for their business.

Watch On-Demand

Webinar Series: Technical Product Tour 

Join us for a live and interactive demonstration of Cyren's unified cloud security platform. 

Multiple dates and times available

Register Today

 

Cyren In The News

PRNewswire- In a previous column, I wrote about how evasive malware has become commoditized and described how the techniques being used in any given piece of malware had grown in number and sophistication—the layering of multiple techniques being its own form of sophistication.