Praise is best shared publicly. Last week, I received this message from Michael Russell, the CIO of the state of Virginia Community Colleges system. I want to thank ...
Praise is best shared publicly. Last week, I received this message from Michael Russell, the CIO of the state of Virginia Community Colleges system. I want to thank ...
Starting Today: Stop shaking hands. Stop clicking on any email that mentions Coronavirus! Our security analysts have seen a significant rise in phishing emails that ...
Back when email was on-premises, your email server sat somewhere in a data center, protected by your security stack that was designed specifically for on-premises em...
Have you heard of Microsoft Sway? If you haven’t, there’s a good chance your users don’t know about it either. That’s why this content creation service is used in ph...
Avanan has uncovered a new sextortion attack that uses QR codes instead of URLs to avoid bitcoin wallet detection. To drive the attack, hackers claim they have foota...
This summer, we reported that hackers were bypassing Office 365 EOP and ATP with an ingeniously simple attack that uses HTML attachments in email to launch phishing ...
As we enter the 2020 election season, we are once again discussing the possibility of foreign intervention, which puts the 2016 hack of the Democratic National Commi...
Email is not secure by nature, because email was never meant to be secure. The way email is used today — and its security needs — differs greatly from what its inven...
This week’s Data Connectors Cybersecurity Strategies Conference in Fort Lauderdale was a special occasion. Klint Walker, the Chief Information Security Advisor (CISA...
What is BEC? There is ambiguity about what Business Email Compromise (BEC) means. Is it an email impersonating an executive for financial gain? Is it the same thing ...