{"id":3159,"date":"2020-02-06T07:44:04","date_gmt":"2020-02-06T12:44:04","guid":{"rendered":"https:\/\/www.exchangedefender.com\/blog\/?p=3159"},"modified":"2020-01-31T10:56:18","modified_gmt":"2020-01-31T15:56:18","slug":"every-business-email-needs-anti-phishing-protection","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2020\/02\/every-business-email-needs-anti-phishing-protection\/","title":{"rendered":"Every Business Email Needs Anti-Phishing Protection"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/01\/XD-FB-SS-10.png\" alt=\"\" class=\"wp-image-3164\" width=\"724\" height=\"607\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/01\/XD-FB-SS-10.png 940w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/01\/XD-FB-SS-10-300x251.png 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/01\/XD-FB-SS-10-768x644.png 768w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">What is Phishing?<\/h4>\n\n\n\n<p>In recent years, spear phishing attacks have been on the rise, and have costed American businesses millions of dollars per year in time and resources.  <\/p>\n\n\n\n<p>Phishing is a fraudulent attempt\nvia email to obtain sensitive information like username, passwords and credit\ncard details. This type of attack is tricky because the phishing email appears\nto be from a trustworthy entity like Netflix, or Apple for example. <\/p>\n\n\n\n<p>Furthermore, the phishing\nemail typically has a call to action, and directs the user to a website via a\nlink within the email. This website then asks the user to update personal information\n\u2013 and boom, your information now is in the hands of hackers. &nbsp;<\/p>\n\n\n\n<p>According to a recent study by Verizon (2019), over 80% of security compromises start with a spear phishing email. ExchangeDefender can help you eliminate spear phishing threats or just provide notifications to your users when they get tricked into clicking on a link leading somewhere dangerous.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">The solution: ExchangeDefender Spear Phishing Protection<\/h4>\n\n\n\n<p>ExchangeDefender provides the most sophisticated and most comprehensive real-time protection from email phishing threats through ExchangeDefender Phishing Firewall, External Sender flagging, real-time databases of safe and dangerous sites, and flexible phishing content handling policies.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">The Basics:<\/h4>\n\n\n\n<p>1. ExchangeDefender\u2019s phishing protection works on every device that is wifi-enabled with the ability to receive email. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>2. There is no download or\ninstallation required for the security feature.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>3. Our email spear phishing protection enables you to whitelist and blacklist email addresses and domains. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Spear Phishing Protection Highlights:<\/h4>\n\n\n\n<p><strong>Phishing Firewall<\/strong><\/p>\n\n\n\n<p>ExchangeDefender rewrites the URL of links in HTML emails and redirects you through our cloud filtering service that can alert or block threats you may inadvertently click on. (Learn More)<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Flag External Emails<\/strong><\/p>\n\n\n\n<p>ExchangeDefender modifies the subject of messages received from outside of your organization, so nobody can ever mistake a message from external source or a coworker. ([EXTERNAL])<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Blacklist \/ Whitelist<\/strong><\/p>\n\n\n\n<p>ExchangeDefender Phishing Firewall allows organizations, domains, groups, and users to maintain a list of safe and dangerous web sites, to which traffic should be allowed to pass or be blocked.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To learn more about ExchangeDefender\u2019s Email Phishing protection and how it works, <a href=\"https:\/\/exchangedefender.com\/phishing.php\">click here<\/a>. <br> <br> You can also explore our <a href=\"https:\/\/exchangedefender.com\/advanced-email-security.php\">advanced email security suite<\/a> that includes phishing protection, and so much more!<\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,48],"tags":[],"class_list":["post-3159","post","type-post","status-publish","format-standard","hentry","category-exchangedefender","category-security"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=3159"}],"version-history":[{"count":9,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3159\/revisions"}],"predecessor-version":[{"id":3169,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3159\/revisions\/3169"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=3159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=3159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=3159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}