Have you heard of Microsoft Sway? If you haven’t, there’s a good chance your users don’t know about it either. That’s why this content creation service is used in ph...
Have you heard of Microsoft Sway? If you haven’t, there’s a good chance your users don’t know about it either. That’s why this content creation service is used in ph...
This week’s Data Connectors Cybersecurity Strategies Conference in Fort Lauderdale was a special occasion. Klint Walker, the Chief Information Security Advisor (CISA...
Email is used by 3.8 billion people every day, and its popularity is only growing. Unfortunately, that makes it the favorite channel for opportunistic and targeted a...
A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive/personal information, or in...
Avanan CMO Michael Hiskey was recently interviewed on Digital Trends Live, a show about tech and its many moving parts. Host Greg Nibler led the conversation on how ...
Proofpoint and Mimecast are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email server. This works well...
Regardless of their age, role, or security competency, employees must follow basic practices to protect organization and its data. Training doesn’t have to come in t...
When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work account...
Slack is now the most popular and fastest-growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations,...
Within the span of a few months during summer 2017, two major phishing attacks on Washington state school districts resulted in the theft of $50,000 worth of compute...
Microsoft Advanced Threat Protection (ATP) serves a real need when it comes to fortifying the basic anti-phishing, anti-virus, and anti-malware that make up EOP, whi...
UPDATE: May 12, 2020 Microsoft made news earlier this week by announcing that they are rolling out a feature that can block reply-all email storms. Just a friendly ...
As an administrator, how can you standardize healthy account management at your organization and reduce the risk of account compromise? What configurations and setti...
When you first deploy Avanan, you can conveniently identify and quarantine malicious content that was lurking in any mailbox at your organization. When an Office 365...
Learn how to create a policy that quarantines phishing and malware emails before they hit your users' Office 365 inboxes. This goes beyond just the emails that Micro...
Link scanning is a security feature that identifies the safety of a link attached in an email. This protects users in the event that hackers would install malware or...
IIn this short video, we show you how to easily see and monitor successful login attempts to Office 365 coming from outside the United States. Although employee logi...
Proxy servers have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies ha...
It is starting to look like the US, following in the footsteps of the EU, may crack down on how tech companies collect personal data. The National Telecommunications...
New York, September 26, 2018—SINET announced the recipients of the 2018 SINET 16 Innovator Award, which recognizes sixteen early stage and emerging technology compan...