Discover our blog

MSP Cybersecurity

How MSPs Can Sell Cybersecurity to Overly Optimistic SMBs

Stop me if you’ve heard this one before: “It won’t happen to us.” This is a common refrain among SMBs that are...

Malware - Ransomware

4 Ways Hackers Use Phishing to Launch Ransomware Attacks

MSPs have been on the receiving end of relentless ransomware attacks in 2019. In June, hackers infiltrated a number of...

MSP Cybersecurity

Microsoft Inspire 2019: The Future of Partnership

In July, I had the pleasure of participating in Microsoft Inspire 2019, a conference dedicated to partners and...

Phisher's Favorites

Phishers’ Favorites: Microsoft #1 but Facebook Phishing Surges

Today, we published our Phishers’ Favorites report for Q2 2019. Now in its fifth edition, Phishers’ Favorites ranks the...
Research

3 Ways Cybercriminals Hack into Netflix Accounts

Today’s Internet users aren’t the surfers of the past: we are consumers, and hackers understand this. When one person...

Spear Phishing

Anatomy of a Spear Phishing Email

MSP Cybersecurity

Post-delivery Threat Remediation Puts MSPs Back in Control

One of the biggest complaints we hear about secure email gateways is that they produce an excess of false positives...