Blog

Blog

Don't Fall For Threatening Phishing Emails, Do This Instead.

A majority of online users have had some of their personal identity data exposed in one of the thousands of major breaches that's occurred in the last few years.

Read More »

New Phishing Attacks Mimic Branded Microsoft 365 Login Pages

Phishing attacks are still on the rise. And hackers are getting more sophisticated in the ways they spoof elements in a user's environment in order to gain access.

Read More »

These Were The Scariest Reveals From 2019's DEF CON Hacking Conference

DEF CON is the world's largest underground hacking conference. It's been running since 1992 and is always a wealth of information about cybersecurity vulnerabilities.

Read More »

Watch Out for This Nasty Spoofed Blackmail Attack

Every day our cybersecurity team investigates and fights against a wide variety of phishing emails and spoofing attacks.

Read More »

I Watched a Real Hacker in Action and Here's What I Learned.

Okay, quick disclaimer, no crime was committed here. This person agreed to demonstrate how hackers operate as part of a service to keep business owners informed about the type of threats that are out there. This type of attack is happening to someone right now, every day of the week.

Read More »

60,000 New Emails! What to Do If You Get Subscription Bombed-Part 2

This is Part 2 in a Blog Series About Email Subscription Bombs, Read Part 1 Here.

Email Security Best Practices

While every type of attack can't be stopped, it is crucial to make email safety a priority.

Read More »

60,000 New Emails! This is What Happens When Your Inbox Gets Subscription Bombed.

Hopefully, this has never happened to you. You open your email on Monday morning to find you’re bombarded with “Thank you for your subscription!” emails in all different languages - from all different newsletters you never signed up for. It’s called a “Subscription Bomb,” and while not as prominent as some recent phishing scams, our expert techs have helped clients who have been bombed to mitigate their risk of loss and configure their email settings to fight off future attacks.

Read More »
   
New Call-to-action

Posts by Topic

see all