Brand Spoofing Reports

MicroScope – December 2020: Reasons to be positive for 2021
sponsored by MicroScope
EZINE: In this issue, discover why the continued digital transformation trend means 2021 is looking good for the channel. Also read how business processes can be optimised by adding artificial intelligence to the mix, and how the channel is looking at the challenge of sustainability
Posted: 08 Feb 2021 | Published: 04 Dec 2020

MicroScope

A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 08 Feb 2021 | Published: 05 Apr 2019

TechTarget ComputerWeekly.com

Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hewlett Packard Enterprise

Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT: This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009

MarkMonitor

Kaspersky Internet Security 7.0
sponsored by Kaspersky
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
Posted: 04 Apr 2011 | Published: 11 Jun 2010

Google Apps

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses
sponsored by Cisco Systems, Inc.
CASE STUDY: Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Cisco Systems, Inc.

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro

Five Network Security Threats and How to Protect Your Business
sponsored by Qwest Communications
WHITE PAPER: Threats abound in today’s corporate networks. Keeping your enterprise and its assets secure requires a proactive security strategy. Discover the five most costly network security threats and see how you can protect your business with a layered security approach.
Posted: 26 Aug 2010 | Published: 25 Aug 2010

Qwest Communications