Egress

London, UK
2007
  |  By Egress
As the threat landscape continues to evolve, cybercriminals are relentlessly refining their phishing tactics. This means that many of the tips and tricks organizations have told their employees to use in the past to spot a malicious email are no longer as effective in safeguarding their digital environments. Here, we dissect three commonly cited phishing detection strategies and unveil their limitations in the face of advanced cyber threats.
  |  By Egress
In today's digital landscape, an organization’s C-suite and senior executives hold the most valuable corporate data and sign-off authorities, meaning they represent the highest potential risk over email. Whether it’s inbound spear phishing attacks, or outbound mistakes resulting in a damaging data breach, the C-suite are vulnerable.
  |  By James Dyer
With Valentine’s Day just around the corner, it comes as no surprise that Egress’ Threat Intelligence team is starting to see an uptick in romance-based phishing attacks. In particular, they noted a staggering 43% increase in attacks impersonating well-established dating apps including Tinder and Hinge between January 1, 2024, until February 5, 2024, compared to 2023. This is only likely to increase as the day draws closer.
  |  By James Dyer
Since January 13th, 2024, our Threat Intelligence team has seen a steep rise in the number of fraudulent payment attacks using Venmo. By hacking existing or setting up new Venmo accounts, cybercriminals are using legitimate Venmo communications to trick users into approving fraudulent payments.
  |  By James Dyer
Since the start of 2024, Egress’ threat intelligence team has seen a 109% increase in Salesforce phishing attacks using what appears to be a legitimate email domain linked to Salesforce that impersonates Meta. Leveraging obfuscation techniques to mask a malicious URL, attackers are attempting to drive users to a very convincing spoof of a Meta ‘Partner Portal’ to harvest their credentials.
  |  By Egress
Account takeover (ATO) is a form of identity theft in which cybercriminals can send emails from a legitimate business account. Threat actors who have control of a business leader's inbox can request payments and confidential information from employees, knowing that they're likely to be more successful than if they had simply made a spoof email account. Unfortunately, ATO is on the rise. Statistics show that ATO cases have skyrocketed since 2019.
  |  By Egress
Account takeover (ATO) is a form of identity theft that enables cybercriminals to send emails from a legitimate account within an organization. Hackers who gain control of an executive's account can request sensitive data and payments from employees in the knowledge that they're more likely to succeed than if they had simply created a spoofed email account. Our recently published Email Security Risk Report revealed that 58% of the 500 companies we surveyed had experienced instances of account takeover.
  |  By Egress
Over the last couple of difficult years, businesses worldwide have been forced to accelerate their adoption of new technologies and IT security – and cybercriminals have been just as fast to catch up. Fresh from our latest report, here are some headline stats about phishing that you need to know for 2024.
  |  By Egress
Account takeover (ATO) is a form of identity theft that happens when cybercriminals get their hands on a victim's login details. Once a fraudster has unlawful access to users' email accounts, they can impersonate their victims and trick employees into sending sensitive business data or large sums of money. In our recently published Email Security Risk Report, 58% of the 500 companies surveyed had experienced account takeover.
  |  By Egress
This year’s Email Security Risk Report touches on a range of topics from inbound email security and data loss prevention, including the fallout of successful phishing attacks, how Cybersecurity leaders feel about their secure email gateways (SEGs), and the limitations of traditional SAT programs.
  |  By Egress

Find out more about our products at: https://www.egress.com/products

  |  By Egress

Download your copy of the 2023 Email Security Risk Report here: https://egress.co/ufxrO

  |  By Egress
Jack Chapman, Egress VP of Threat Intelligence, talks through some key results from the Fighting Phishing report and what they mean for organizations. Get the latest insights into ransomware, business email compromise (BEC), and payment scams. Egress' mission is to make digital communication safer for everyone.
  |  By Egress
Human activated risk is real for every organization Whether it’s introduced through coercion by bad actors, human error, or malicious intent, human activated risk is a problem that keeps getting worse. Organizations need intelligent technology that can stop the sophisticated phishing attacks that continue to evade native security defenses, as well as outbound email risk which is too often underestimated.
  |  By Egress

We recently caught up with Max Harper to get his view on why our partnership with Spear Shield - Cybersecurity Solutions (https://www.spearshield.co.uk) is off to a flying start 👌 We love our shared value of using great t

  |  By Egress
In this video, we’ll provide an in-depth explanation on business email compromise. Learn more about BEC here: Business email compromise, or 'BEC', presents a growing problem for organisations of all sizes. In fact, over 6,000 businesses are targeted each month, making the UK the second most targeted region (26%) after the US (39%). That's why you and your colleagues should be aware of the tell-tale signs of a BEC attack and what you can do to avoid falling prey to phishing attempts. Do you have any questions about business email compromise? Let us know in the comments section below!
  |  By Egress
Stop targeted email attacks with Egress Defend. We combine zero-trust models with intelligent linguistic and contextual analysis to detect the sophisticated cyberattacks that bypass your traditional email security solutions. Our real-time alerts and feedback provide teachable moments that clearly explain risk to users. This provides active learning that augments your security awareness training programs and builds a first line of defense against threats.
  |  By Egress
Stop email data loss with Egress Prevent Prevent uses social graph and contextual machine learning technologies on desktop and mobile to accurately model user relationships. We then detect anomalous recipients in real time to avoid a damaging data breach. Importantly, we also supervise our machine learning algorithms with policies so Prevent can immediately detect more outbound risks, such as wrong attachments, conflicts of interest, data exfiltration, and weak TLS certificates.
  |  By Egress
Make sending encrypted emails easy with Egress Protect. Our simple controls combined with gateway encryption, means you can send and revoke sensitive emails and large files securely. Maintaining your compliance and removing risk. Our flexible authentication techniques remove friction and even allow trusted recipients seamless access to sensitive emails without having to log into a separate secure portal.
  |  By Egress
Easily share confidential data with Egress Secure Workspace. Our encrypted environment offers enterprise-grade permissions at the click of a button. This enables employees to control how teammates and external partners interact with files to keep sensitive content secure. Secure Workspace can be used to share files of any size or format, and users can set controls to limit when and where recipients can access information, and what they can do with it. Robust anti-virus checks, and accredited security frameworks provide additional protection.
  |  By Egress
People are your last line of defense against phishing attacks: it's time to secure your human layer Organizations have rapidly matured security and controls for their networks and applications but their human layers - their people - urgently require better defenses to detect and mitigate email-borne threats.
  |  By Egress
Microsoft 365 is the world's go-to productivity platform - but its native security technology is limited in its ability to stop outbound email data breaches. Outbound email is the leading cause of data loss across all industries and native Microsoft 365 security features aren't intelligent enough to protect you from human-activated data loss.
  |  By Egress
People will always make mistakes - and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help avoid mistakes, sensitive patient information remains at risk.
  |  By Egress
Remote working has been a necessity for many organisations over the past year. But with a tentative re-opening of offices on the cards, how many of us will be making a full-time return? We've surveyed 3,000 remote workers to bring you the most up-to-date picture of the remote working landscape.
  |  By Egress
The 2021 Data Loss Prevention Report The rapid uptake of digital communication has kept organisations operating - but not without risk. With more data being shared comes the increased likelihood of a breach - and with employees burnt out from the pandemic, the risk in 2021 is higher than ever.

We’re all targeted by attacks. We all make mistakes. We all break the rules. After all, we’re only human. Make people your greatest defense with Human Layer Security, by Egress.

Our Human Layer Security platform combines contextual machine learning, powerful encryption and analytics technologies to prevent human-activated data breaches, protect sensitive data, and enable you to proactively monitor risk.

Egress Intelligent Email Security:

  • Machine learning that stops email security breaches: Make sure you’re emailing the right content to the right people, every time. Our contextual machine learning analyses message content, recipients and domains all in real time to deeply understand user behaviour, spot anomalies and remove the risk of a costly breach.
  • Beyond Microsoft 365 controls: Every 12 hours, organisations experience email security incidents that native controls in clients such as Outlook for Microsoft 365 can't mitigate. Using the latest in intelligent technology, we're able to detect email security risks and stop security breaches before they happen.
  • Securing your digital transformation: The COVID-19 pandemic has accelerated digital transformation at an unprecedented rate. Our intelligent technology puts security at the heart of new digital communication processes, including email and secure file transfer, protecting you from non-compliance with regulations and litigation by data subjects.

The world’s only Human Layer Security platform.