figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Results for: phishing

slider item
Zero Trust Access Management

Why Phishing Attacks Increase on Holiday Seasons

Guest Writer 31.05.21

Overview Phishing continues to be a major attack vector, and it’s surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email — see this example).  There’s still a general perception that phishing attacks […]

Read more
slider item
Identity & Access Management (IAM)

4 Credential Phishing Myths You Can’t Ignore

Dror Arie 28.04.21

Credential phishing is the practice of stealing user ID/email address and password combinations by masquerading as a reputable or known entity. Attackers then use the victim’s credentials to carry out attacks on a secondary target, such as breaching into enterprise networks. GlobalDots, in collaboration with Identity Governance market leader Okta, gathered 4 common misconceptions which lead […]

Read more
slider item

Enterprise Mobile Phishing Increased by 37% in Q1 2020

Admin Globaldots 05.06.20

Enterprise Mobile Phishing Increased by 37% in Q1 2020

Read more
slider item

Surge in Phishing Attacks Using Legitimate reCAPTCHA Walls

Admin Globaldots 04.05.20

Surge in Phishing Attacks Using Legitimate reCAPTCHA Walls

Read more
slider item

Blacklists Miss 21% of Phishing Attacks, Internet Traffic Reveals

Admin Globaldots 13.03.20

Blacklists Miss 21% of Phishing Attacks, Internet Traffic Reveals

Read more
slider item

How to Prevent Phishing Attacks 3

Admin Globaldots 18.12.19

Phishing is a method employed by cyber-criminals to access email accounts and systems using deception rather than defeating security protections. In this article we take a look at various types of phi

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure