<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">
Blog Post2FWebinar Images (100)

What Are Botnets and How to Defend Against Them

Reece Guida | September 12, 2018 | Filed Under: Blog | Read More »

In 2016, the infamous Mirai botnet briefly derailed the internet, shutting down Dyn servers responsible for internet traffic and much of the internet’s infrastructure. Despite the ...

Prevent Phishing

Stop Phishing with Avanan's Anti-Phishing Software

Reece Guida | September 5, 2018 | Filed Under: Blog | Read More »

In March of 2018, an employee at The Financial Services Information Sharing and Analysis center (FS-ISAC) clicked on a malicious link. From there, the phished email spread in waves...

Blog Post2FWebinar Images (95)

6 Cyber Security Tips for Employees

Reece Guida | August 27, 2018 | Filed Under: Blog | Read More »

Regardless of their age, role, or cyber security competency, employees must follow basic practices to protect your organization and its data. Training doesn’t have to come in the f...

Blog Post2FWebinar Images (91)

PhishPoint: New SharePoint Phishing Attack Affects an Estimated 10% of Office 365 Users

Reece Guida | August 14, 2018 | Filed Under: Blog, Attack Report | Read More »

  Over the past two weeks, we detected (and blocked) a new phishing attack that affected about 10% of Avanan's Office 365 customers. We estimate this percentage applies to Office 3...

Blog Post2FWebinar Images (87)

Fake Invoices: Why Does Office 365 Keep Missing These Phishing Attacks?

Dylan Press | July 31, 2018 | Filed Under: Blog, Attack Report | Read More »

Emails with fake invoices has been one of the most popular attack vectors against Office 365 email users for the past several years. The malicious emails are disguised as invoices ...

Blog Post2FWebinar Images (84)

ACE Archives: Microsoft finally closes hole that allowed trojans to bypass Office 365 default security

Dylan Press | July 26, 2018 | Filed Under: Blog | Read More »

For several weeks, we detected (and blocked) an attack targeting one of the largest municipalities in the U.S. that bypassed Office 365 default security, using a simple yet extreme...

Blog Post2FWebinar Images (86)

What is Shadow IT and Why Does it Exist?

Reece Guida | July 26, 2018 | Filed Under: Blog | Read More »

Despite its menacing name, the practice of Shadow IT—when employees work with unsanctioned software, hardware, or applications on personal or company devices—is as reasonable as th...

Blog Post2FWebinar Images (65)

WEBINAR: What to look for in a CASB

Michael Landewe | July 25, 2018 | Filed Under: Webinars | Read More »

During this session, we demonstrate how Avanan's next-generation Cloud Access Security Broker redefines the term CASB.

Blog Post2FWebinar Images (76)

Throwback Thursday: The DNC email hacks by Russian hacking firms

Dylan Press | July 18, 2018 | Filed Under: Blog | Read More »

In 2016, we wrote a blog post and hosted a webinar summarizing the Russian hacks against the DNC. Two years later, Mueller's indictments have have both confirmed the initial report...

Blog Post2FWebinar Images (74)

What is a Cloud Access Security Broker (CASB)? | Infographic

Dylan Press | July 11, 2018 | Filed Under: Blog | Read More »

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats. Gartner first defined the term Cloud Access ...

Blog Post2FWebinar Images (72)

4 Major Ways Phishing Attacks Have Evolved In The Last Ten Years

Dylan Press | July 3, 2018 | Filed Under: Blog | Read More »

Ten years is an eternity when it comes to technology. Back in 2008, the Motorola Razor was the most popular cellphone on the market and Blu-Ray was set to be the future of home ent...

Blog Post2FWebinar Images (70)

Why Employee Training Can't Solve The Phishing Problem

Michael Landewe | June 27, 2018 | Filed Under: Blog | Read More »

Microsoft’s 2018 23rd Edition Security Intelligence Report is out, and it confirms the conclusion that most in the security industry already know: we can no longer rely upon the en...

Blog Post2FWebinar Images (61)

ZeroFont Phishing: Manipulating Font Size to Get Past Office 365 Security

Yoav Nathaniel | June 13, 2018 | Filed Under: Blog | Read More »

Recently, we have been seeing a number of phishing attacks using a simple strategy to get their blatant email spoofs past Microsoft's phishing scans. The tactic, which we are calli...

definition-of-casb

What makes a good CASB (Cloud Access Security Broker)?

Don Byrne | June 7, 2018 | Filed Under: Blog | Read More »

What is a CASB? I am attending the Gartner Security and Risk Management Conference this week, and both analysts and customers are seeing a change in the cloud security marketplace....

Weaponizing-Google-Featured

How G Suite Is Weaponized By Hackers

Dylan Press | May 23, 2018 | Filed Under: Blog | Read More »

Google's G Suite brings much needed convenience and organization to the enterprise cloud. Because of its popularity, however, it is a favorite target for hackers. 

atp-featured

White Paper: Avanan vs Microsoft ATP

Dylan Press | May 22, 2018 | Filed Under: White Papers | Read More »

For approximately the same cost as Microsoft ATP, you can do much better. We break down Advanced Threat Protection's security features and compare them to the full-stack security p...

baseStriker-featured-1

baseStriker: Office 365 Security Fails To Secure 100 Million Email Users

Yoav Nathaniel | May 8, 2018 | Filed Under: Blog | Read More »

Update: Microsoft has repaired this vulnerability on 5/16/18, two weeks after we first reported it to them. We recently uncovered what may be the largest security flaw in Office 36...

cost-of-ransomware

The Cost of Ransomware Prevention vs Recovery

Dylan Press | April 27, 2018 | Filed Under: Blog | Read More »

Like any business decision, handling ransomware needs to be approached with ROI in mind. Is it better to invest in ransomware-preventing technology, or is the risk sufficiently low...

Spoofpoint

Is Office 365 more secure without Proofpoint?

Michael Landewe | April 6, 2018 | Filed Under: Blog | Read More »

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email—a pretty basic phishing attack that bypassed both Proofpoint and M...

8-considerations-featured

8 Security Considerations When Moving to Office 365

Don Byrne | March 30, 2018 | Filed Under: Blog | Read More »

So you’re considering a move to Office 365? Or, maybe you just moved? After you board up the server room and breathe a huge sigh of relief, it’s time to rethink what you know about...