Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/21/2010
08:49 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

White Paper: Corporate Ignorance Of Phishing May Prove Catastrophic

New Red Condor white paper examines the damage to corporate economics and reputation in the event of a phishing attack

Rohnert Park, Calif. – July 15, 2010 – In a new white paper addressing the mounting phishing problem, Red Condor asks the question, “What is the cost of corporate ignorance?” Recent widely publicized cyber attacks and industry research suggest that companies and their executives have ignored the phishing problem or even scoffed at the notion that phishing poses threats on par with traditional methods of corporate espionage. Red Condor’s paper suggests that companies must make security a part of everything they do and develop their products and services with a primary consideration on protecting their corporate data and customers’ information. When they fail to do so, the results can be catastrophic. Visit RedCondor.com to download “Phishing for Disaster: the Cost of Corporate Ignorance.”

“All it takes is one careless or lazy individual to click on a link or download an attachment in an email to give scammers the access they need to steal usernames, passwords and other sensitive information,” said Dr. Tom Steding, CEO of Red Condor. “In order to stop phishing, corporate executives and email users must grasp the size and scope of the phishing problem and then change their behavior.”

Takeaways from the Red Condor white paper include:

How is phishing the next vector for corporate espionage?

What can happen to a company’s or bank’s reputation in the event of a spear phishing attack?

When developing products or services, what should be priority one?

Who or what should take the lead in terms of information security?

* In addition to new technologies, what else needs to change in order to stop phishing attacks? * Where do criminals go to maximize the profit potential of phishing scams? * What are the responsibilities of company executives when it comes to protecting employees and customers?

The entire white paper, “Phishing for Disaster: the Cost of Corporate Ignorance,” can be downloaded for free from Red Condor’s online Resources section under White Papers at http://www.redcondor.com/resources/whitepapers/0710.phishing-white-paper.pdf.

About Red Condor

Red Condor’s highly accurate email filter Vx Technology™ hybrid architecture and fully managed appliances lead to a dramatic reduction in the cost of owning a premium spam filter. With email security solutions for small-to-medium businesses, as well as for ISPs with millions of email inboxes, Red Condor is rapidly gaining market share. The company’s email security system has built-in zero tolerance for lost email, and a near zero false-positive rate, with spam block rates that exceed 99%. Red Condor Archive is a secure message archiving service with lifetime retention and unlimited storage. The company's award-winning technology is backed 24/7 by a team of human email security experts monitoring for the latest email threats. For more information, visit www.redcondor.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.