Microsoft Teams has quickly become the go-to option for many remote workers during the pandemic to collaborate and share files, data, and valuable information. Teams...
Microsoft Teams has quickly become the go-to option for many remote workers during the pandemic to collaborate and share files, data, and valuable information. Teams...
Slack, a wildly popular SaaS communication tool for the modern workplace, helps users become significantly more productive.
Encryption functions are algorithms designed to render data unreadable to anyone that does not have the decryption key. Data encrypted with a strong encryption algor...
Malicious emails are behind 90% of cyberattacks and deliver 75% of ransomware. These phishing emails are designed to trick or manipulate employees into clicking on a...
A link is not always what it seems. Hackers have gone to great lengths to create convincing websites that look just like the real deal. Oftentimes, this is spoofing ...
Social engineering is a security threat that targets humans rather than computers or software. Social engineers use a combination of trickery, coercion, and similar ...
According to Verizon’s 2021 Data Breach Investigations Report (DBIR), phishing is a leading cause of data breaches, accounting for over a third of incidents. It is a...
Secure Email Gateways (SEGs) are an email security solution that sits inline on emails’ path from the public Internet to the corporate email server. This position al...
Smishing is a form of phishing attack that targets mobile devices. Instead of sending phishing content over email, smishers use SMS or MMS text messages to deliver t...
Simply put, phishing emails are designed to trick the recipient into believing that they are legitimate. A common way of accomplishing this is by making the emails a...
Spear phishing is a form of phishing attack that is targeted at an individual or a small group. Unlike broader phishing attacks that use pretexts that apply to many ...
In an account takeover (ATO) attack, an attacker gains unauthorized access to the credentials for a user’s online account. This access can then be used for identity ...
Email is one of the most common vectors by which cybercriminals gain access to corporate networks and steal sensitive data. This makes email security a vital compone...
Phishing emails are one of the most common cyber threats that an organization may face. Phishing attacks can be used to accomplish a variety of goals for an attacker...
We're excited to release SmartPhish Analysis. In our email dashboard, you'll see a number of info panels that give insight into our AI's decision into marking an ema...
Slack Security Slack is an incredibly popular app. It became a lifeline for so many companies during remote work in 2020 and it will remain an essential part of work...
The State of Business Email Compromise Everyone is talking about Business Email Compromise (BEC) attacks. And with good reason.
What is a Whaling Attack? A whaling attack is a specialized attack that falls under the larger category of spear phishing. Before we can define what whaling is, it’s...
What is Phishing? The first mass email in 1978 was sent to just under 400 users. That seems quaint, now. It would be ten years before mass emailing turned into somet...
Hackers want your credentials. It’s why the Verizon DBIR found that the top threat varieties in breaches were phishing and the use of stolen creds. Phish users to ge...