Avanan Blog Cloud Security Tips (3)


6-Things-You-Need-to-Know-About-Microsoft-Security-in-Office-365-Featured

How Secure is Microsoft Email Security? 6 Pros and Cons to Office 365 Email Protection

Microsoft Office 365 is the most popular target and vector for email phishing attacks. Office 365 Security is Microsoft’s best — especially compared to its 30-year c...

Read more

How-Default-Email-Configurations-Help-Hackers-Featured

How Default Email Configurations Help Hackers

Recently, I talked about an unexplored, but potentially devastating issue in InfoSecurity magazine: default Software-as-a-Service (SaaS) configurations. Sure, they'r...

Read more

When-Allow-Lists-Pile-Up-Email-Security-and-Technical-Debt

When Allow Lists Pile-Up: Email Security and Technical Debt

Recently, I analyzed the inboxes of a company representing a typical enterprise account of more than 10,000 email users. I found something alarming. Because of Allow...

Read more

slack-secure-featured

Is Slack Secure? Slack Security Concerns Explained

Slack is now the most popular and fastest-growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations,...

Read more

How-to-Stop-Reply-All-Email-Storms-Featured

How to Stop Reply-All Email Chain Storms

UPDATE: May 12, 2020 Microsoft made news earlier this week by announcing that they are rolling out a feature that can block reply-all email storms.  Just a friendly ...

Read more

5-Signs-of-a-Compromised-Account-Featured

What is a Compromised Account? 5 Signs You’re at Risk

As an administrator, how can you standardize healthy account management at your organization and reduce the risk of account compromise? What configurations and setti...

Read more

link-featured-img

Why Does Link Scanning Miss so Many Phishing Attacks?

Link scanning is a security feature that identifies the safety of a link attached in an email. This protects users in the event that hackers would install malware or...

Read more

proxy-featured

Why Proxy Servers Cause Security Vulnerabilities

Proxy servers have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies ha...

Read more

Blog Post2FWebinar Images (100)

Botnet Defense: What Are Botnets and How to Prevent Attacks

In 2016, the infamous Mirai botnet briefly derailed the internet, shutting down Dyn servers responsible for internet traffic and much of the internet’s infrastructur...

Read more

Blog Post2FWebinar Images (70)

Phishing Training for Employees: Why Employee Training Can't Solve The Phishing Problem

Microsoft’s 2018 23rd Edition Security Intelligence Report is out, and it confirms the conclusion that most in the security industry already know: we can no longer r...

Read more

cost-of-ransomware

The Cost of Ransomware Prevention vs Recovery in 2019

Like any business decision, handling ransomware needs to be approached with ROI in mind. Is it better to invest in ransomware-preventing technology, or is the risk s...

Read more

Spoofpoint

Is Microsoft Office 365 safer without Proofpoint? or Can 1+1=0?

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email—a pretty basic phishing attack that bypassed both P...

Read more

8-considerations-featured

Office 365: 8 Security Considerations When Moving to Office 365

So you’re considering a move to Office 365? Or, maybe you just moved? After you board up the server room and breathe a huge sigh of relief, it’s time to rethink what...

Read more

Blog Post2FWebinar Images (52)

Cloud Security Glossary

As if "the cloud" weren't vague enough of a concept in itself, the vocabulary describing cloud security can be equally as elusive. At Avanan, we believe that cloud s...

Read more

Cloud Access Trojan Featured

Enterprise Cloud Access Apps: The Invisible Trojan Backdoor

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

Read more

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly disco...

Read more

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

When people think of phishing attacks, what often comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite...

Read more

Avanan Anomaly Alerts during an Account Takeover

Account Takeover: A Critical Layer Of Your Email Security

Last week the National Law Review published a short news article about the massive data breach that happened through email at the Henry Ford Health System. What they...

Read more

Was My Email Inbox Hacked? What To Do If You've Been Hacked

Before you continue reading, you should check to see if your email address is one of the millions that has already been compromised: HaveIBeenPwned.com. An attacker ...

Read more

Blog Post2FWebinar Images (34).png

What to Do After You Have Fallen Victim to a Phishing Attack

Even if you could block 100% of malware and phishing, it is still possible to have a compromised account: a lost post-it note, a massive Linkedin-type password breac...

Read more

1 2 3 4
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial