Avanan Blog Cloud Security Tips (3)


Blog Post2FWebinar Images (52)

Cloud Security Glossary

As if "the cloud" weren't vague enough of a concept in itself, the vocabulary describing cloud security can be equally as elusive. At Avanan, we believe that cloud s...

Read more

Cloud Access Trojan Featured

Enterprise Cloud Access Apps: The Invisible Trojan Backdoor

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

Read more

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly disco...

Read more

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

When people think of phishing attacks, what often comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite...

Read more

Avanan Anomaly Alerts during an Account Takeover

Account Takeover: A Critical Layer Of Your Email Security

Last week the National Law Review published a short news article about the massive data breach that happened through email at the Henry Ford Health System. What they...

Read more

Was My Email Inbox Hacked? What To Do If You've Been Hacked

Before you continue reading, you should check to see if your email address is one of the millions that has already been compromised: HaveIBeenPwned.com. An attacker ...

Read more

Blog Post2FWebinar Images (34).png

What to Do After You Have Fallen Victim to a Phishing Attack

Even if you could block 100% of malware and phishing, it is still possible to have a compromised account: a lost post-it note, a massive Linkedin-type password breac...

Read more

450421681.jpg

Gmail Phishing Attack: How to Identify a Phishing Email in Gmail

Gmail Phishing is the most popular way for attackers to gain access to your Google Cloud. It can be difficult to keep up with all the methods for detecting phishing ...

Read more

why-not-mta-graphic.png

Why MTA Gateways are Not Effective SaaS Email Security Appliances

Don't change your email security. Change the way it is connected. With the massive adoption of Office 365 and G-Suite for corporate email, companies hoping to implem...

Read more

cyber-security-icon.jpg

The Legal Considerations of Moving Data to the Cloud.

January 28th is Data Privacy Day. To commemorate, we are holding an online panel discussion with Chantal Bernier and Todd Daubert of Dentons, the world’s largest law...

Read more

How Many Days is Zero-Day Malware?

  Yesterday Office 365 finally caught the piece of malware we've been using in our demos for the past 5 months. The bad news, however, is that it took us only five m...

Read more

1 2 3
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial