Reece Guida

Reece Guida



Cybercriminals Use Microsoft Sway Scams to Phish Office 365 Security and Your Well-Trained Users

Have you heard of Microsoft Sway? If you haven’t, there’s a good chance your users don’t know about it either. That’s why this content creation service is used in ph...

Read more

homeland-security-featured

What Did the CISA of Homeland Security Say at Data Connectors?

This week’s Data Connectors Cybersecurity Strategies Conference in Fort Lauderdale was a special occasion. Klint Walker, the Chief Information Security Advisor (CISA...

Read more

featured-image (1)

What Is a Secure Email Gateway and Are They Still Viable?

Email is used by 3.8 billion people every day, and its popularity is only growing. Unfortunately, that makes it the favorite channel for opportunistic and targeted a...

Read more

featured-image

What is a Phishing Scam?

A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive/personal information, or in...

Read more

Phishing-Attacks-and-the-Human-Factor-Featured-Image

Phishing Attacks and the Human Factor

Avanan CMO Michael Hiskey was recently interviewed on Digital Trends Live, a show about tech and its many moving parts. Host Greg Nibler led the conversation on how ...

Read more

Proofpoint-and-Mimecasts-Insider-Threat-Problem-Featured

Proofpoint and Mimecast's Insider Threat Problem

Proofpoint and Mimecast are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email server. This works well...

Read more

Blog Post2FWebinar Images (95)

6 Cyber Security Tips and Best Practices for Employees

Regardless of their age, role, or security competency, employees must follow basic practices to protect organization and its data. Training doesn’t have to come in t...

Read more

Why-Multi-Factor-Authentication-Isnt-Foolproof-Featured

Why Multi-Factor Authentication (MFA) Security Isn't Foolproof

When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work account...

Read more

slack-secure-featured

Is Slack Secure? Slack Security Concerns Explained

Slack is now the most popular and fastest-growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations,...

Read more

Screen Shot 2019-02-08 at 4.34.32 PM

Protecting Bethel School District from Phishing and Malware with Avanan

Within the span of a few months during summer 2017, two major phishing attacks on Washington state school districts resulted in the theft of $50,000 worth of compute...

Read more

ATP-Anti-Phishing-Compared-to-Avanan-Featured

ATP Anti-Phishing Compared to Avanan

Microsoft Advanced Threat Protection (ATP) serves a real need when it comes to fortifying the basic anti-phishing, anti-virus, and anti-malware that make up EOP, whi...

Read more

How-to-Stop-Reply-All-Email-Storms-Featured

How to Stop Reply-All Email Chain Storms

UPDATE: May 12, 2020 Microsoft made news earlier this week by announcing that they are rolling out a feature that can block reply-all email storms.  Just a friendly ...

Read more

5-Signs-of-a-Compromised-Account-Featured

What is a Compromised Account? 5 Signs You’re at Risk

As an administrator, how can you standardize healthy account management at your organization and reduce the risk of account compromise? What configurations and setti...

Read more

Use Case Video Title Cards (1)

How to Find and Quarantine Emails from Compromised Accounts in Office 365

When you first deploy Avanan, you can conveniently identify and quarantine malicious content that was lurking in any mailbox at your organization. When an Office 365...

Read more

Intro Card 2

How to Create a Policy to Quarantine Phishing and Malware Emails in Office 365

Learn how to create a policy that quarantines phishing and malware emails before they hit your users' Office 365 inboxes. This goes beyond just the emails that Micro...

Read more

link-featured-img

Why Does Link Scanning Miss so Many Phishing Attacks?

Link scanning is a security feature that identifies the safety of a link attached in an email. This protects users in the event that hackers would install malware or...

Read more

final intro card

How to Monitor Successful Logins to Office 365 Coming from Outside the US

IIn this short video, we show you how to easily see and monitor successful login attempts to Office 365 coming from outside the United States. Although employee logi...

Read more

proxy-featured

Why Proxy Servers Cause Security Vulnerabilities

Proxy servers have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies ha...

Read more

Blog Post2FWebinar Images

GDPR US Equivalent: Is the US Version of GDPR on the Horizon?

It is starting to look like the US, following in the footsteps of the EU, may crack down on how tech companies collect personal data. The National Telecommunications...

Read more

SINET-featured

SINET Names Avanan a Top 16 Cybersecurity Innovator

New York, September 26, 2018—SINET announced the recipients of the 2018 SINET 16 Innovator Award, which recognizes sixteen early stage and emerging technology compan...

Read more

1 2
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial