Why you need a multi-layer approach to email security

  1. Introduction
  2. Demo - Initial setup of sample phishing site
  3. Phishing site is live, setting up email accounts
  4. Sending email to ATP protected account
  5. Sending email to Google enterprise email
  6. Comparing results with RevBits ES (Outlook impersonation)
  7. Impersonating Bank of America website
  8. Sending BoA impersonation URL to ATP and Google emails
  9. RevBits ES vs Bank of America Impersonation
  10. Known malicious URL Test
  11. Known malicious URL inside PDF sent to ATP
  12. Known malicious URL inside PDF sent to Google Enterprise email
  13. Adding PDF inside DOCX
  14. Sending DOCX with PDF inside to Google Enterprise email
  15. RevBits Email Security vs DOCX with embedded PDF with malicious URL
  16. Six layer compression test with RevBits Email Security
  17. Password protected attachments vs RevBits Email Security
  18. Conclusion

Related Insights

Key Cybersecurity Considerations When Onboarding New Employees
September 14, 2020

Key Cybersecurity Considerations When Onboarding New Employees

It’s a common misconception that the only threats to an enterprise’s security come from external actors. Whether intentional or not, 47% of organizational data breaches are the result of internal human error, such as a misplaced device or document. Moreover, some employees present an even larger risk than others. According to recent reports, younger employees are more likely to bypass security protocols that are viewed as an impediment to their productivity. When it comes to onboarding new employees, young or old, enterprises must have proper security awareness & anti-phishing training, in addition to a strong privileged access management solution, to guard against the different types of human error that could create security vulnerabilities.

Lookalike Login Pages Pose a Serious Cyber Risk
May 11, 2020

Lookalike Login Pages Pose a Serious Cyber Risk

Although email phishing has taken many forms throughout the years, the most common type of email scam is also the oldest. Since 2003, black-hat hackers have created domain names and web pages that look virtually identical to actual websites and have linked these copycat sites to vulnerable users via emails. It is increasingly difficult to tell the difference between a real web page and a fake one, especially for companies without sophisticated anti-phishing tools. For all companies, it's important to have the best anti-phishing solutions in place to ensure all data is protected and downtime is avoided.

Email Phishing Training and Anti-Phishing Tools Matter Most Before the Holidays
December 23, 2019

What Are Phishing Attacks and How to Stop Phishing Attacks

Have you ever received an email that looks totally legitimate, links to a website that looks real, and asks for personal information? It is becoming harder and harder to know who and what can be trusted. Phishing is the practice of trying to get an unsuspecting email user to engage with an email in some way (opening, clicking, downloading an attachment, sending money, etc.).

Contact Details

Contact RevBits

Message icon Request a Demo