Have you heard of Microsoft Sway? If you haven’t, there’s a good chance your users don’t know about it either. That’s why this content creation service is used in ph...
Have you heard of Microsoft Sway? If you haven’t, there’s a good chance your users don’t know about it either. That’s why this content creation service is used in ph...
This week’s Data Connectors Cybersecurity Strategies Conference in Fort Lauderdale was a special occasion. Klint Walker, the Chief Information Security Advisor (CISA...
A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive/personal information, or in...
Avanan CMO Michael Hiskey was recently interviewed on Digital Trends Live, a show about tech and its many moving parts. Host Greg Nibler led the conversation on how ...
Within the span of a few months during summer 2017, two major phishing attacks on Washington state school districts resulted in the theft of $50,000 worth of compute...
Microsoft Advanced Threat Protection (ATP) serves a real need when it comes to fortifying the basic anti-phishing, anti-virus, and anti-malware that make up EOP, whi...
When you first deploy Avanan, you can conveniently identify and quarantine malicious content that was lurking in any mailbox at your organization. When an Office 365...
Learn how to create a policy that quarantines phishing and malware emails before they hit your users' Office 365 inboxes. This goes beyond just the emails that Micro...
IIn this short video, we show you how to easily see and monitor successful login attempts to Office 365 coming from outside the United States. Although employee logi...
Proxy servers have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies ha...