Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»General Information»Introducing Cofense Reporter
    General Information

    Introducing Cofense Reporter

    By Gerald Johnson Jr.October 4, 2018Updated:February 20, 20192 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

                              Introducing Cofense Reporter

    Cofense Reporter Button

    Spear phishing emails are one of the greatest threats facing organizations like ours today. You may think that deleting a spear phishing email is adequate to keep our organization safe.

    However the simple act of reporting a suspicious email can go a long way toward thwarting attempted data breaches and minimizing the associated damage.

    Consider the following facts:

    53% of all breaches are discovered by someone outside of your organization.

    Attackers remain in a network for an average of 146 days before detected.

    Over 90% of targeted cyber attacks start with a spear phishing email.

    How Do I Report Suspect Emails?

    Previously, reporting potential phishing emails could be a confusing process. Now, all that is needed to report an email is one click of the Reporter button in your inbox. Once you have reported the email, we will immediately notify you that your report has been submitted.

    What Happens After I Report A Suspect Email?

    After you report a suspicious email using the Reporter, the University Information Security Office (UISO) will investigate the email as a potential phishing attack. There is no penalty for reporting a harmless email. But if the email is malicious, the intel you have provided will help us determine the attack’s source and prevent similar attacks on our organization in the future.

    For more information on Cofense Reporter including how to authorize it with your email, click here.

    Thank you for your assistance in keeping your data and our organization safe.

    If you suspect that you have received a spear phishing email at work, use the Reporter button for reporting it immediately.

     

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleTake Fordham’s Cyber Security Training
    Next Article Virus and User support scams.

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d