Avanan Blog Cloud Security Tips


Social Engineering Attacks

Social engineering is a security threat that targets humans rather than computers or software. Social engineers use a combination of trickery, coercion, and similar ...

Read more

What is Cloud Email Security?

According to Verizon’s 2021 Data Breach Investigations Report (DBIR), phishing is a leading cause of data breaches, accounting for over a third of incidents. It is a...

Read more

What is a Secure Email Gateway (SEG)?

Secure Email Gateways (SEGs) are an email security solution that sits inline on emails’ path from the public Internet to the corporate email server. This position al...

Read more

What is Smishing?

Smishing is a form of phishing attack that targets mobile devices. Instead of sending phishing content over email, smishers use SMS or MMS text messages to deliver t...

Read more

What is Email Spoofing?

Simply put, phishing emails are designed to trick the recipient into believing that they are legitimate. A common way of accomplishing this is by making the emails a...

Read more

What Helps Protect from Spear Phishing?

Spear phishing is a form of phishing attack that is targeted at an individual or a small group. Unlike broader phishing attacks that use pretexts that apply to many ...

Read more

What is Account Takeover (ATO)?

In an account takeover (ATO) attack, an attacker gains unauthorized access to the credentials for a user’s online account. This access can then be used for identity ...

Read more

Top 5 Email Security Threats

Email is one of the most common vectors by which cybercriminals gain access to corporate networks and steal sensitive data. This makes email security a vital compone...

Read more

How to Stop Phishing Emails?

Phishing emails are one of the most common cyber threats that an organization may face. Phishing attacks can be used to accomplish a variety of goals for an attacker...

Read more

SmartPhish Analysis Takes Email Investigation to a New Level

We're excited to release SmartPhish Analysis. In our email dashboard, you'll see a number of info panels that give insight into our AI's decision into marking an ema...

Read more

Slack Security: How to Collaborate Safely

Slack Security Slack is an incredibly popular app. It became a lifeline for so many companies during remote work in 2020 and it will remain an essential part of work...

Read more

Business Email Compromise: What You Need to Know to Stay Safe

The State of Business Email Compromise Everyone is talking about Business Email Compromise (BEC) attacks. And with good reason.

Read more

What is a Whaling Attack? The Definitive Guide

What is a Whaling Attack? A whaling attack is a specialized attack that falls under the larger category of spear phishing. Before we can define what whaling is, it’s...

Read more

How to Stop Phishing Emails Using Avanan

What is Phishing? The first mass email in 1978 was sent to just under 400 users. That seems quaint, now. It would be ten years before mass emailing turned into somet...

Read more

What is Email Spoofing and How Does it Work?

Hackers want your credentials. It’s why the Verizon DBIR found that the top threat varieties in breaches were phishing and the use of stolen creds. Phish users to ge...

Read more

Are Your Users Dumpster Diving in the Junk Folder?

Highlights Microsoft’s Office 365 ATP policies flag an unusually high percentage of legitimate emails as phishing detections Organizations that set their ATP policie...

Read more

Featured images

What is Email Security? A Guide to All 3 Types of Email Security

Email is not secure by nature, because email was never meant to be secure. The way email is used today — and its security needs — differs greatly from what its inven...

Read more

Featured images

What is Business Email Compromise (BEC)?

What is BEC? There is ambiguity about what Business Email Compromise (BEC) means. Is it an email impersonating an executive for financial gain? Is it the same thing ...

Read more

featured-image (1)

What Is a Secure Email Gateway and Are They Still Viable?

Email is used by 3.8 billion people every day, and its popularity is only growing. Unfortunately, that makes it the favorite channel for opportunistic and targeted a...

Read more

featured-image

What is a Phishing Scam?

A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive/personal information, or in...

Read more

1 2 3
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial