Why Traditional Security Solutions aren’t Stopping Ransomware

75% of companies that were hit by ransomware last year had up to date endpoint protection solutions in place. Why didn’t that help stop the attacks? Let’s take a look at the most common approaches to ransomware prevention, and why they haven’t been able to provide a solution for enterprises.

Designing Zero Trust Endpoints

Zero Trust is becoming a standard approach to securing access to enterprise applications (both cloud and on-prem). With Zero Trust, access is granted based primarily on user authentication and risk level, and not on the user’s presence in the corporate network. Based on the user’s credentials, the enterprise can grant access to a subset of enterprise resources and employees can work from any network without relying on a VPN connection. The architecture is called “Zero Trust” because the enterprise shouldn’t automatically trust endpoints within the corporate perimeter. Instead, it should verify all users and endpoints.

Is VDI Cost Effective vs Win10 Laptops?

VDI involves hosting virtual desktops on centralized server and storage infrastructure. In this blog post we discuss the cost effectiveness of VDI versus Windows 10, and what factors need to be accounted for when choosing between VDI and DaaS (Desktop-as-a-Service).

Should Salesforce Security be a Concern for You?

Many organizations don’t consider the risk that Salesforce exposes them to and the importance of Salesforce security. In this blog, we will cover the use cases that expose organizations to potential risks, and the different solutions for how to best protect against them.  

What is EAC?

EAC, short for Email Account Compromise, is a type of cybersecurity attack in which cyber attackers attempt to fully compromise a user’s email account and gain access to their inboxes through several techniques, including malware, phishing and password spray. The attacker will then impersonate the user whose account they have breached and send phishing emails […]

What is Cyber Threat Intelligence?

Cyber Threat Intelligence (CTI) is, in essence, data that has been analyzed and validated through multiple analysis processes specific to cybersecurity.

Characteristics of Best Email Security Solutions

Many enterprises are suffering from a growing number of severe cyberattacks, where the majority of them – over 90% – originate from a malicious email and actually could have been prevented by a next-gen advanced email security solution with the right features and necessary level of protection. As a CISO or security leader, you are probably asking yourself, what are the characteristics of the top-notch email security solutions in the market? What should you look for, when evaluating an email security solution?

SEGs vs. ICES Solutions: The Complete Guide

Default Email Security

Find out everything there is to know about Gartner’s two email security solution categories, SEGs (Secured Email Gateways) and ICES (Integrated Cloud Email Security), including their benefits, differences, and how each is deployed.

The (Yet) Unsolved Problem of Email Security

email symbols connected by lines

The number of cyberattacks is dramatically on the rise, the majority originating via email. Unfortunately many security leaders have just accepted this reality as fact. This blog discusses how you can evaluate whether you have the right email security solution to get the job done.

Virtual Event: How did the bad guys get in? Attack vectors in the modern enterprise

Have you ever wondered how you were hacked? In this meetup, Perception Point will discuss the latest attack vectors that cybercriminals are employing to breach organizations. We will cover various techniques used through the email channel, cloud collaboration channels including Box, Dropbox, OneDrive, and Google Drive and perimeter breaches – diving into the attack kill chains.

Top Flaws in Typical Email Security Solutions

Email Security Solutions

Since its inception, Perception Point has been scanning billions of emails, URLs and files every week. Most of the time, Perception Point clients already have at least one email security solution in place.

Employee Security Training <br> Proven Not Enough

Security Awareness Training

Train the machine—not just the employee. Hackers know that many companies rely on security employee training alone, so they’ve been upping their game to trick even the most trained employees into phishing scams. Phishing email attacks are nothing new. These attacks have been around for 15 years, but they are still one of the top […]

Default Email Security Not Secure Enough

Default Email Security

The adoption of cloud email is increasing every year, with Google Workspace and Microsoft Office 365 dominating. And now, a new report by Gartner noted that many clients have expressed dissatisfaction with default email security solutions, specifically citing Office 365.

Don’t Forfeit Productivity for Secure Internal Email Communication

internal email security person typing on laptop

Gone are the days of running down the hall to ask an important question and get the answer immediately. Remote and hybrid workforces depend heavily on email to communicate and share files. How can you secure email communication – especially for internal emails at the speed your business requires. Despite these changes, the need for […]

Bringing PREVENTION Back!

Listen to this short podcast to learn about content-based threats, the potential cyber threats of collaboration tools, and how the COVID-19 pandemic affects the current threat landscape. At the end of this session, you can also learn how Perception Point solves these issues and how we’re bringing PREVENTION is back.

User Experience vs. Cyber Security

There’s a tension between security and business enablement. There’s also a tension between security and user experience. So what can you do about it? A full article on the dos and don’t’s on user experience in cybersecurity