Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Smishing and vishing attacks can dupe even the most vigilant users with persuasive, convincing text and voice messages. Here are 6 ways to prevent these types of attacks.
Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
In this video, Tom Huntington (Executive Vice President of Technical Solutions), Robin Tatam (Director of Security Technologies), and Amneris Teruel (Senior Expert specializing in IBM i) discuss the current state of IBM i and give their opinion on topics such as Security, Automation, High Availability and Cloud, among others.
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Despite all the IBM i security vendors that Fortra has bought over the years--and there have been at least five of them--the company has lacked one key security capability valued by enterprises: encryption.