Discover our blog

Email Security

Mitigating the Dangers of an Insider Threat

The term “insider threat” in email security brings to mind malicious employees, but the truth is more complicated....

Spear Phishing

Business Email Compromise: An Old Threat Finds New Targets

Business Email Compromise or BEC presents a radically more sophisticated version of the age-old “Nigerian Prince”...

Spear Phishing

Top Tricks Used in CEO Fraud

CEO fraud is a type of spear phishing attack in which a hacker impersonates a CEO via email and persuades a victim to...

MSP Cybersecurity

The XaaS Consumption Model: Monetizing the Seat

Research has shown that there are 78 million SMB users—or seats—in the US market, each with an average technology...

Microsoft 365

Office 365 Phishing Attacks: How Hackers Get Access to Your Business

With 258 million corporate users, the highly popular Microsoft platform has become a target-rich environment for...
Email Security

3 Ways an Email Feedback Loop Boosts Security Awareness

Reporting an email threat is one of the most important steps users can take to help secure their businesses and...

Email Security

Why It’s So Hard to Spot a Spoofed Email

Email spoofing is single most common feature between phishing and spear phishing emails. The methods hackers use to...