Why you need a multi-layer approach to email security
Introduction
Demo - Initial setup of sample phishing site
Phishing site is live, setting up email accounts
Sending email to ATP protected account
Sending email to Google enterprise email
Comparing results with RevBits ES (Outlook impersonation)
Impersonating Bank of America website
Sending BoA impersonation URL to ATP and Google emails
RevBits ES vs Bank of America Impersonation
Known malicious URL Test
Known malicious URL inside PDF sent to ATP
Known malicious URL inside PDF sent to Google Enterprise email
Adding PDF inside DOCX
Sending DOCX with PDF inside to Google Enterprise email
RevBits Email Security vs DOCX with embedded PDF with malicious URL
Six layer compression test with RevBits Email Security
Password protected attachments vs RevBits Email Security
Conclusion
Related Insights

It’s Time to Think Out-of-the-Box About Cybersecurity
“I could end the deficit in 5 minutes. You just pass a law that says anytime there is a deficit of more than 3% of GDP, all sitting members of Congress are ineligible for re-election.” - Warren Buffett

Is Your Email Security Built to Withstand Determined Intruders?
We take great care to safeguard our homes and valuable assets with numerous methods of defense. We employ layers of protection, with double locks on external doors, alarm sensors on windows, strategically placed motion-activated cameras and signs in the yard to deter intruders.

Are You Still Falling for These Cybersecurity Misconceptions?
We currently live in a cultural climate of escalating misinformation, spurious ideations, and fomenting conspiracy theories. Pick a topic - health, finance, politics… Brittany Spears - and you’ll unearth a plethora of factual distortion and false beliefs. The Covid-19 pandemic and subsequent vaccination program continues to be fraught with conflicting confabulations and political media manipulations. It’s hard to know what to trust, where to place your faith, or how to attain a sense of security. And security, on a personal and business level, is a core primary concern. Relying upon inaccurate information or outdated myths could lead to devastating consequences.