Avanan Blog Cloud Security Tips


history-of-phishing-feat

The History and Future of Phishing [Infographic]

See why phishing has became one of cyber security's most common threats, and what can be done about it. Lots of numbers, percentages, and costs are associated with phishing and its damages. Learn about the...

Read more

what-is-CASB-ft

What Is a Cloud Access Security Broker (CASB)?

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats.

Read more

Featured images

What is Business Email Compromise (BEC)?

There is ambiguity about what Business Email Compromise (BEC) means. Is it an email impersonating an executive for financial gain? Is it the same thing as account ta...

Read more

featured-image (1)

What Is a Secure Email Gateway and Are They Still Viable in 2020?

Email is used by 3.8 billion people every day, and its popularity is only growing. Unfortunately, that makes it the favorite channel for opportunistic and targeted a...

Read more

featured-image

What is a Phishing Scam?

A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive information, or infiltrate ...

Read more

4-Reasons-Microsoft-Safe-Links-Make-Office-365-Less-Safe-Featured

5 Reasons Microsoft Safe Links Make Office 365 Less Safe

Since the first successful phishing attack, we have trained our email users to read every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) included ...

Read more

Weaponizing-Google-Featured

How G Suite Is Weaponized by Hackers in 2019

Google's G Suite brings much needed convenience and organization to the enterprise cloud. Because of its popularity, however, it is a favorite target for hackers. 

Read more

Blog Post2FWebinar Images (95)

6 Cyber Security Tips for Employees in 2019

Regardless of their age, role, or security competency, employees must follow basic practices to protect organization and its data. Training doesn’t have to come in t...

Read more

Why-Multi-Factor-Authentication-Isnt-Foolproof-Featured

Why Multi-Factor Authentication Isn't Foolproof

When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work account...

Read more

Phishing-Infographic-Featured-new

How Email Became the Weakest Link [Infographic]

See why phishing has became one of cyber security's most common threats, and what can be done about it. Lots of numbers, percentages, and costs are associated with p...

Read more

6-Things-You-Need-to-Know-About-Microsoft-Security-in-Office-365-Featured

6 Things You Need to Know About Microsoft Security in Office 365

Microsoft Office 365 is the most popular target and vector for email phishing attacks. Office 365 Security is Microsoft’s best — especially compared to its 30-year c...

Read more

How-Default-Email-Configurations-Help-Hackers-Featured

How Default Email Configurations Help Hackers

Recently, I talked about an unexplored, but potentially devastating issue in InfoSecurity magazine: default Software-as-a-Service (SaaS) configurations. Sure, they'r...

Read more

When-Whitelists-Pile-Up-Email-Security-and-Technical-Debt-Featured

When Whitelists Pile-Up: Email Security and Technical Debt

Recently, I analyzed the inboxes of a company representing a typical enterprise account of more than 10,000 email users. I found something alarming. Because of white...

Read more

slack-secure-featured

Is Slack Secure? Slack Security Explained

Slack is now the most popular and fastest growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations,...

Read more

How-to-Stop-Reply-All-Email-Storms-Featured

How to Stop Reply-All Email Storms

Last week, Maria Peterson, a government employee in Utah, sent what she thought was an email inviting her colleagues to the annual holiday potluck. Instead, she acci...

Read more

1 2 3
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial