Data breaches are becoming ever more expensive both in terms of the number of lost records and loss of customer trust.
Data breaches are becoming ever more expensive both in terms of the number of lost records and loss of customer trust.
One of the first things you have to do when deploying a Secure Email Gateway like Mimecast or Proofpoint is change your MX Records. Mail Exchange (MX) records are ne...
One of the major vectors for cyberattacks is through the supply chain.
If you use Microsoft 365 for your email, you've likely considered (or already have) Microsoft Advanced Threat Protection to secure your email. (It's now being referr...
A new report has found that the construction industry is most at risk for ransomware attacks.
The Omicron variant of COVID-19 is spreading rapidly around the world. While we wait for more information on how it will change the pandemic, hackers have decided to...
Other API-based solutions work by remediating a malicious email after it hits the inbox. The hope this that it will be removed before the user clicks.
Microsoft Outlook is built for productivity. That means they offer helpful tools designed to supercharge and streamline daily work.
One of the most pernicious computer viruses in history was called Nimda. Though it propagated in many ways, it specialized in spreading via an email attachment.
The majority of all phishing attacks are of the credential harvesting variety.