Avanan Blog Cloud Security Tips


The Different Types of Ransomware

Ransomware is a top-of-mind security concern for many organizations. However, not all ransomware attacks are the same. A number of different ransomware variants are ...

Read more

Emotet Malware

Emotet is a sophisticated, self propagating Trojan . While Emotet began as a banking trojan, its modular design has allowed it to evolve into a distributor for other...

Read more

How Should Companies Handle Ransomware?

In 2021, high-profile ransomware attacks, such as the Colonial Pipeline and Kaseya hacks, caused significant disruptions to supply chains and companies’ operations.

Read more

Human-Operated Ransomware

Ransomware has emerged as a dominant cyber threat and one of the most expensive types of cyberattacks that an organization can fall victim to. However, not all ranso...

Read more

What is a Vishing Attack?

Vishing – a portmanteau of voice and phishing – attacks are performed over the phone, and are considered a type of a social engineering attack, as they use psycholog...

Read more

What is Content Disarm and Reconstruction (CDR)?

Content disarm and reconstruction (CDR), also known as Threat Extraction, proactively protects against known and unknown threats contained in documents by removing e...

Read more

What Is Sandboxing?

Sandboxing is a cybersecurity practice where you run code, observe and analyze and code in a safe, isolated environment on a network that mimics end-user operating e...

Read more

How Should Companies Handle Ransomware?

In 2021, high-profile ransomware attacks, such as the Colonial Pipeline and Kaseya hacks, caused significant disruptions to supply chains and companies’ operations.

Read more

What is Cloud DLP (Data Loss Prevention)?

Data loss prevention (DLP) solutions are essential to protect the sensitive information of an organization and its customers. DLP solutions are designed to monitor d...

Read more

Top Microsoft Teams Security Issues

Microsoft Teams has quickly become the go-to option for many remote workers during the pandemic to collaborate and share files, data, and valuable information. Teams...

Read more

Top Slack Security Issues and Concerns in 2022

Slack, a wildly popular SaaS communication tool for the modern workplace, helps users become significantly more productive. 

Read more

What is Email Encryption?

Encryption functions are algorithms designed to render data unreadable to anyone that does not have the decryption key. Data encrypted with a strong encryption algor...

Read more

Email Security Features

Malicious emails are behind 90% of cyberattacks and deliver 75% of ransomware. These phishing emails are designed to trick or manipulate employees into clicking on a...

Read more

What is URL Phishing?

A link is not always what it seems. Hackers have gone to great lengths to create convincing websites that look just like the real deal. Oftentimes, this is spoofing ...

Read more

Social Engineering Attacks

Social engineering is a security threat that targets humans rather than computers or software. Social engineers use a combination of trickery, coercion, and similar ...

Read more

What is Cloud Email Security?

According to Verizon’s 2021 Data Breach Investigations Report (DBIR), phishing is a leading cause of data breaches, accounting for over a third of incidents. It is a...

Read more

What is a Secure Email Gateway (SEG)?

Secure Email Gateways (SEGs) are an email security solution that sits inline on emails’ path from the public Internet to the corporate email server. This position al...

Read more

What is Smishing?

Smishing is a form of phishing attack that targets mobile devices. Instead of sending phishing content over email, smishers use SMS or MMS text messages to deliver t...

Read more

What is Email Spoofing?

Simply put, phishing emails are designed to trick the recipient into believing that they are legitimate. A common way of accomplishing this is by making the emails a...

Read more

What Helps Protect from Spear Phishing?

Spear phishing is a form of phishing attack that is targeted at an individual or a small group. Unlike broader phishing attacks that use pretexts that apply to many ...

Read more

1 2 3 4
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial