Avanan Blog Cloud Security Tips (2)


Are Your Users Dumpster Diving in the Junk Folder?

Highlights Microsoft’s Office 365 ATP policies flag an unusually high percentage of legitimate emails as phishing detections Organizations that set their ATP policie...

Read more

Featured images

What is Email Security? A Guide to All 3 Types of Email Security

Email is not secure by nature, because email was never meant to be secure. The way email is used today — and its security needs — differs greatly from what its inven...

Read more

Featured images

What is Business Email Compromise (BEC)?

What is BEC? There is ambiguity about what Business Email Compromise (BEC) means. Is it an email impersonating an executive for financial gain? Is it the same thing ...

Read more

featured-image (1)

What Is a Secure Email Gateway and Are They Still Viable?

Email is used by 3.8 billion people every day, and its popularity is only growing. Unfortunately, that makes it the favorite channel for opportunistic and targeted a...

Read more

featured-image

What is a Phishing Scam?

A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive/personal information, or in...

Read more

history-of-phishing-feat

The History and Future of Phishing [Infographic]

See why phishing has became one of cyber security's most common threats, and what can be done about it. Lots of numbers, percentages, and costs are associated with p...

Read more

4-Reasons-Microsoft-Safe-Links-Make-Office-365-Less-Safe-Featured

Safe Links | Why Is This Microsoft Office 365 Safe Link Not Safe?

Since the first successful phishing attack, we have trained our email users to read every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) included ...

Read more

Weaponizing-Google-Featured

How Can A Google Drive Account Be Weaponized By Hackers?

Google's G Suite brings much-needed convenience and organization to the enterprise cloud. But, can a Google Drive account be hacked? Because of its popularity, it is...

Read more

Blog Post2FWebinar Images (95)

6 Cyber Security Tips and Best Practices for Employees

Regardless of their age, role, or security competency, employees must follow basic practices to protect organization and its data. Training doesn’t have to come in t...

Read more

Why-Multi-Factor-Authentication-Isnt-Foolproof-Featured

Why Multi-Factor Authentication (MFA) Security Isn't Foolproof

When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work account...

Read more

Phishing-Infographic-Featured-new

How Email Became the Weakest Link [Infographic]

See why phishing has became one of cyber security's most common threats, and what can be done about it. Lots of numbers, percentages, and costs are associated with p...

Read more

6-Things-You-Need-to-Know-About-Microsoft-Security-in-Office-365-Featured

How Secure is Microsoft Email Security? 6 Pros and Cons to Office 365 Email Protection

Microsoft Office 365 is the most popular target and vector for email phishing attacks. Office 365 Security is Microsoft’s best — especially compared to its 30-year c...

Read more

How-Default-Email-Configurations-Help-Hackers-Featured

How Default Email Configurations Help Hackers

Recently, I talked about an unexplored, but potentially devastating issue in InfoSecurity magazine: default Software-as-a-Service (SaaS) configurations. Sure, they'r...

Read more

When-Allow-Lists-Pile-Up-Email-Security-and-Technical-Debt

When Allow Lists Pile-Up: Email Security and Technical Debt

Recently, I analyzed the inboxes of a company representing a typical enterprise account of more than 10,000 email users. I found something alarming. Because of Allow...

Read more

slack-secure-featured

Is Slack Secure? Slack Security Concerns Explained

Slack is now the most popular and fastest-growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations,...

Read more

How-to-Stop-Reply-All-Email-Storms-Featured

How to Stop Reply-All Email Chain Storms

UPDATE: May 12, 2020 Microsoft made news earlier this week by announcing that they are rolling out a feature that can block reply-all email storms.  Just a friendly ...

Read more

5-Signs-of-a-Compromised-Account-Featured

What is a Compromised Account? 5 Signs You’re at Risk

As an administrator, how can you standardize healthy account management at your organization and reduce the risk of account compromise? What configurations and setti...

Read more

link-featured-img

Why Does Link Scanning Miss so Many Phishing Attacks?

Link scanning is a security feature that identifies the safety of a link attached in an email. This protects users in the event that hackers would install malware or...

Read more

proxy-featured

Why Proxy Servers Cause Security Vulnerabilities

Proxy servers have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies ha...

Read more

Blog Post2FWebinar Images (100)

Botnet Defense: What Are Botnets and How to Prevent Attacks

In 2016, the infamous Mirai botnet briefly derailed the internet, shutting down Dyn servers responsible for internet traffic and much of the internet’s infrastructur...

Read more

1 2 3
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial