Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Fortra: Unmasking Email Fraud: Insights into Threats and Defenses

Truth in IT
05/22/2023
78
2 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


In this clip, John Wilson, a senior fellow of threat research for Fortra, discusses the company's cybersecurity solutions and the increasing threat of email-based fraud. Fortra, previously known as Help Systems, offers a comprehensive cybersecurity portfolio and specializes in addressing the challenges of hybrid IT environments, where organizations have a mix of on-premises and cloud solutions.

Wilson emphasizes the importance of email security and anti-phishing measures. He explains that Fortra's suspicious email analysis solution helps identify potentially malicious emails by analyzing reported messages. While most reported emails turn out to be false alarms or spam, a significant portion falls into the "do not engage" or malicious categories.

Wilson shares insights into the types of threats that reach users' inboxes, noting that response-based threats (without links or attachments) and credential theft are prevalent. He highlights the increasing prevalence of malicious and "do not engage" emails, which have reached a two-year high.

To compare the effectiveness of different security gateways, Wilson conducted a study using Fortra's suspicious email analysis reports. The analysis revealed varying levels of effectiveness among different secure email gateways. The study also compared the performance of different gateways against Office 365's default anti-spam module, showing that the best secure email gateway significantly outperformed Office 365 in blocking threats.

Wilson further delves into response-based threats, discussing the rise of vishing (voice phishing) and other categories like business email compromise, job scams, and tech support scams. He compares the performance of different gateways in blocking these threats, highlighting phishing as a common challenge for all solutions.

In conclusion, Wilson emphasizes the importance of robust email security measures and warns about the increasing risks posed by email-based fraud. He advises organizations to implement effective solutions to protect against these threats.
Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity
Channels:
News:
Events:
Tags:
  • fortra
  • security
  • email
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Fortra: Unmasking Email Fraud: Insights into Threats and Defenses

              Upcoming Webinar Calendar

              • 04/23/2026
                01:00 PM
                04/23/2026
                Cultivating Trust as a Foundation for the Agentic Consumer in 2026
                https://www.truthinit.com/index.php/channel/1883/cultivating-trust-as-a-foundation-for-the-agentic-consumer-in-2026/
              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/

              Upcoming Events

              • Apr
                23

                Cultivating Trust as a Foundation for the Agentic Consumer in 2026

                04/23/202601:00 PM ET
                • Apr
                  29

                  Strategies for Safeguarding AI in Applications, Agents, and APIs

                  04/29/202612:00 PM ET
                  • Apr
                    30

                    Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                    04/30/202610:00 AM ET
                    • Apr
                      30

                      The New Economics of a VMware Exit

                      04/30/202601:00 PM ET
                      • May
                        06

                        Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                        05/06/202602:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version