Reece Guida

Reece Guida



Cybercriminals Use Microsoft Sway Scams to Phish Office 365 Security and Your Well-Trained Users

Have you heard of Microsoft Sway? If you haven’t, there’s a good chance your users don’t know about it either. That’s why this content creation service is used in ph...

Read more

homeland-security-featured

What Did the CISA of Homeland Security Say at Data Connectors?

This week’s Data Connectors Cybersecurity Strategies Conference in Fort Lauderdale was a special occasion. Klint Walker, the Chief Information Security Advisor (CISA...

Read more

featured-image

What is a Phishing Scam?

A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive/personal information, or in...

Read more

Phishing-Attacks-and-the-Human-Factor-Featured-Image

Phishing Attacks and the Human Factor

Avanan CMO Michael Hiskey was recently interviewed on Digital Trends Live, a show about tech and its many moving parts. Host Greg Nibler led the conversation on how ...

Read more

Screen Shot 2019-02-08 at 4.34.32 PM

Protecting Bethel School District from Phishing and Malware with Avanan

Within the span of a few months during summer 2017, two major phishing attacks on Washington state school districts resulted in the theft of $50,000 worth of compute...

Read more

ATP-Anti-Phishing-Compared-to-Avanan-Featured

ATP Anti-Phishing Compared to Avanan

Microsoft Advanced Threat Protection (ATP) serves a real need when it comes to fortifying the basic anti-phishing, anti-virus, and anti-malware that make up EOP, whi...

Read more

Use Case Video Title Cards (1)

How to Find and Quarantine Emails from Compromised Accounts in Office 365

When you first deploy Avanan, you can conveniently identify and quarantine malicious content that was lurking in any mailbox at your organization. When an Office 365...

Read more

Intro Card 2

How to Create a Policy to Quarantine Phishing and Malware Emails in Office 365

Learn how to create a policy that quarantines phishing and malware emails before they hit your users' Office 365 inboxes. This goes beyond just the emails that Micro...

Read more

final intro card

How to Monitor Successful Logins to Office 365 Coming from Outside the US

IIn this short video, we show you how to easily see and monitor successful login attempts to Office 365 coming from outside the United States. Although employee logi...

Read more

proxy-featured

Why Proxy Servers Cause Security Vulnerabilities

Proxy servers have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies ha...

Read more

1 2
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial