Jeremy Fuchs

Jeremy Fuchs



Why the Biggest Threat to Financial Firms is Cyber Attacks

Highlights: Banks are 300% more likely to be attacked than the average industry and were the most attacked vertical in 2019 Those attacks have increased dramatically...

Read more

Why Hospitals Are a Huge Target For Cyber Attacks

Highlights: In addition to fighting off the COVID-19 pandemic, hospitals have been hit by hackers in record-breaking numbers Protecting health care organizations is ...

Read more

Nothing to Hide: Avanan’s “Secret” Sauce, For All to See

We've heard this a lot from our customers, especially when it relates to Secure Email Gateways like Proofpoint and Mimecast. When they asked their previous email sec...

Read more

Avanan and Northamber Sign New Distribution Agreement

London, UK, August 17th, 2020: Leading UK AV & IT Solutions distributor Northamber announced today that it has signed a distribution agreement with Avanan. The agree...

Read more

Garmin Ransomware Attack: New Escalation From Hackers

Garmin was hit with a ransomware attack in late July that affected their website, call centers and other services. 

Read more

Stop Phishing: How Avanan Leverages Machine Learning

Phishing is skyrocketing. According to the Verizon DBIR, 90% of all breaches start with a phishing attack. In Q1 of 2020, phishing attacks increased by 22.5%, accord...

Read more

5 Questions Your Secure Email Gateway Vendor Hopes You Never Ask

If you use Microsoft 365 or G-Suite and are considering a Secure Email Gateway , these are the 5 questions you must ask every vendor. You won't find the answers in t...

Read more

What is a Whaling Attack? The Definitive Guide

What is a Whaling Attack? A whaling attack is a specialized attack that falls under the larger category of spear phishing. Before we can define what whaling is, it’s...

Read more

How to Stop Phishing Emails Using Avanan

What is Phishing? The first mass email in 1978 was sent to just under 400 users. That seems quaint, now. It would be ten years before mass emailing turned into somet...

Read more

What is Email Spoofing and How Does it Work?

Hackers want your credentials. It’s why the Verizon DBIR found that the top threat varieties in breaches were phishing and the use of stolen creds. Phish users to ge...

Read more

The Twitter attack reminds us the perils of internal threats

Twitter Hack: Attackers Gained Access Via Stolen Credentials

The Twitter attack that saw a number of major accounts—like Joe Biden, Barack Obama, Elon Musk and other celebrities—overtaken and hacked was done via a spear phishi...

Read more

Microsoft 365 is Officially the Most Targeted Platform for Hackers

A new report confirms what has long been assumed: Microsoft Office is now the most targeted platform for hackers.

Read more

Companies Are Ditching Secure Email Gateways. This is Why.

Secure Email Gateways were built for on-premises use and in that capacity they worked well. But ask yourself: when was the last time your email was on-premises? It's...

Read more

SiteCloak Phishing: Office 365's Safe Links is Under Attack

Highlights: Attackers have expanded the battleground from the inbox to the web This is the hacker’s response to click-time protection and the technique is able to by...

Read more

No Longer Frustrated: The Long Overdue Change from Mimecast to Avanan

Highlights: After years of being frustrated with Mimecast, on everything from customer service to its inability to stop simple-seeming attacks, this benefits adminis...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial