Discover our blog

Phishing

Color Schemes: Detecting Logos in Phishing Attacks

If a staff member correctly identifies and reports a phishing email, it’s your lucky day—you and your business just...

MSP Cybersecurity

Reporting Threats with One Click in Vade for M365

Reporting malicious emails is critical to the overall security of an organization. Security awareness training will...

Phisher's Favorites

Phishers’ Favorites: After Five Quarters, Microsoft is Unseated by PayPal

Today, we published our Phishers’ Favorites report for Q3 2019. Now in its sixth edition, Phishers’ Favorites ranks...

Phishing

4 Ways Hackers Break Through Fingerprint and Reputation Defenses

Email security remains a top concern for organizations around the world. Ransomware, which had been waning in recent...

Phishing

Healthcare Phishing: Protecting SMBs From Targeted Office 365 Attacks

While it doesn’t get the media attention of attacks on large healthcare organizations, cyberattacks on small, private...

Phishing

5 Common Phishing Techniques

Most email security filters are highly effective at ensuring that spam messages never make it to the inbox. However,...

Email Security

Two-Factor Authentication: The Pros and Cons of 2FA Schemes

“Implement two-factor authentication.” This is the advice given by cybersecurity experts around the world when a...