Microsoft 365 03 June 2022 How to Boss Device Management with Endpoint Manager (aka Intune) Read More
Compliance 26 May 2022 Use this Identity Checklist to secure your M365 tenant Securing a Microsoft 365 tenant starts with making sure you’re using strong authentication to identify… Read More
Press Releases 24 May 2022 Hornetsecurity acquires cybersecurity training experts, IT-Seal Hornetsecurity enhances its portfolio by acquiring cybersecurity training leader IT-Seal. Read More
Email Security, Uncategorized 23 May 2022 Analysis of a malicious email Over the past few months we have seen that the waves of malspam are becoming… Read More
Email Security 22 May 2022 3 Under-Recognized Ways Phishing Attacks Impact Businesses What comes to mind when you think of the impact of phishing attacks? For most MSPs,… Read More
Security Awareness 19 May 2022 The Art of Deception in Social Media Phishing The growth of social media phishing can be largely attributed to the broadening reach of… Read More
Email Security Data Exfiltration: Ransomware’s Beyond-the-Ransom Impact If you’re like most organizations, the term “ransomware” conjures up nightmares of hackers infiltrating your… Read More
Threat Reports 17 May 2022 Email Threat Review April 2022 In this installment of our monthly email threat review, we present an overview of the… Read More
Tested Techniques for Preventing Cloud Attacks on Your System Security Awareness 15 December 2023 Whenever we see a technology rising in the market, it quickly becomes one of the… Read more
1 in 3 organizations does not provide any cybersecurity training to remote workers despite a majority of employees having access to critical data Press Releases 12 January 2023 1 in 3 organizations neglects cybersecurity training for remote workers—learn why it matters. Read more
RLO Technique: How Hackers Are Using a 20-year-Old Text Trick to Attack Microsoft 365 Users Email Security 12 May 2022 While Right-to-Left Override (RLO) attack is an old technique to trick users into executing a… Read more