We've heard this a lot from our customers, especially when it relates to Secure Email Gateways like Proofpoint and Mimecast. When they asked their previous email sec...
We've heard this a lot from our customers, especially when it relates to Secure Email Gateways like Proofpoint and Mimecast. When they asked their previous email sec...
London, UK, August 17th, 2020: Leading UK AV & IT Solutions distributor Northamber announced today that it has signed a distribution agreement with Avanan. The a...
Phishing is skyrocketing. According to the Verizon DBIR, 90% of all breaches start with a phishing attack. In Q1 of 2020, phishing attacks increased by 22.5%, accord...
If you use Microsoft 365 or G-Suite and are considering a Secure Email Gateway , these are the 5 questions you must ask every vendor. You won't find the answers in t...
What is a Whaling Attack? A whaling attack is a specialized attack that falls under the larger category of spear phishing. Before we can define what whaling is, it’s...
The Twitter attack that saw a number of major accounts—like Joe Biden, Barack Obama, Elon Musk and other celebrities—overtaken and hacked was done via a spear phishi...
A new report confirms what has long been assumed: Microsoft Office is now the most targeted platform for hackers.
Secure Email Gateways were built for on-premises use and in that capacity they worked well. But ask yourself: when was the last time your email was on-premises? It's...
Highlights: Attackers have expanded the battleground from the inbox to the web This is the hacker’s response to click-time protection and the technique is able to by...
Highlights: After years of being frustrated with Mimecast, on everything from customer service to its inability to stop simple-seeming attacks, this benefits adminis...