<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">
Spoofpoint

Is Office 365 more secure without Proofpoint?

Michael Landewe | April 6, 2018 | Filed Under: Blog | Read More »

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email - a pretty basic phishing attack that bypassed both Proofpoint and...

8-considerations-featured

8 Security Considerations When Moving to Office 365

Don Byrne | March 30, 2018 | Filed Under: Blog | Read More »

So you’re considering a move to Office 365? Or, maybe you just moved? After you board up the server room and breathe a huge sigh of relief, it’s time to rethink what you know about...

Reagan Attack Featured

The "Ronald Reagan" Attack Allows Hackers to Bypass Gmail's Anti-phishing Security

Yoav Nathaniel | March 22, 2018 | Filed Under: Blog, phishing | Read More »

We started tracking a new method hackers use to bypass Gmail's SPF check for spear-phishing. The hackers send from an external server, the user sees an internal user (For example, ...

Blog Post2FWebinar Images (52)

34 Cloud Security Terms You Should Know

Dylan Press | March 15, 2018 | Filed Under: Blog | Read More »

We hope you use this as a reference not only for yourself but for your team and in training your organization. Print this out and pin it outside your cubicle.

capital-caring-logo

Capital Caring: Avanan Cloud Security for Healthcare

Michael Landewe | March 6, 2018 | Filed Under: Blog, Case Studies | Read More »

Since 1977, Capital Caring has improved care for those facing life-limiting illness through public education, advocacy and direct support of patients and their families. Over 650 e...

LinKRewrites Featured-1

Link Rewrites: The Good, The Bad and The Over-Promised 

Gil Friedrich | March 2, 2018 | Filed Under: Blog | Read More »

URL Link Rewriting is a technique used by several email security companies to help in the fight against malicious links in email. Proofpoint's Targeted Attack Protection (TAP), Mim...

Cloud Access Trojan Featured

Cloud Access Trojan: The Invisible Back Door to Your Enterprise Cloud

Michael Landewe | February 21, 2018 | Filed Under: Blog | Read More »

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

cloud account takeover featured

White Paper: Cloud Account Takeover

Michael Landewe | February 8, 2018 | Filed Under: White Papers | Read More »

This white paper covers everything you need to understand about how Cloud Account Takeovers happen, why they are so dangerous, and what you can do to protect against them.

cloud takeover protection featured

[Webinar] Cloud Takeover Protection

Michael Landewe | January 31, 2018 | Filed Under: Webinars, Videos | Read More »

In this webinars we will demonstrate how organizations quickly detect and protect against cloud takeover attacks using best-of-breed security in a single click.

securing cloud infrastructure featured

[Webinar] Securing Cloud Infrastructure

Michael Landewe | January 31, 2018 | Filed Under: Webinars, Videos | Read More »

In this webinars we will demonstrate how organizations quickly fill security gaps in your cloud infrastructure such as AWS and Azure using best-of-breed security in a single click.

Securing Google G Suite Featured

[Webinar] Securing Google G Suite

Michael Landewe | January 31, 2018 | Filed Under: Webinars, Videos | Read More »

In this webinars we will demonstrate how organizations quickly fill security gaps in Google G Suite using best-of-breed security in a single click.

Securing O365 featured

[Webinar] Securing Office 365

Michael Landewe | January 31, 2018 | Filed Under: Webinars, Videos | Read More »

In this webinars we will demonstrate how organizations quickly fill security gaps in Office 365 using best of breed security in a single click.

Securing Citrix ShareFile Featured

[Webinar] Securing Citrix ShareFile

Michael Landewe | January 31, 2018 | Filed Under: Webinars, Videos | Read More »

In this webinars we will demonstrate how organizations quickly fill security gaps in Citrix ShareFile using best of breed security in a single click.

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Dylan Press | January 17, 2018 | Filed Under: Blog | Read More »

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly discovering that thi...

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

Dylan Press | January 10, 2018 | Filed Under: Blog, phishing | Read More »

When people think of phishing attacks, often what comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite low. Maybe you...

AccountTakeover-Featured.png

Account Takeover: A Critical Layer Of Your Email Security

Gil Friedrich | December 19, 2017 | Filed Under: Blog | Read More »

Last week the National Law Review published a short news article about the massive data breach that happened through email at the Henry Ford Health System. What they didn't publish...

mailsploit-featured.png

Why Mailsploit Is One of the Most Dangerous New Phishing Schemes

Dylan Press | December 14, 2017 | Filed Under: Blog, phishing, Attack Report | Read More »

Avanan has been catching multiple attacks against its customers using a new phishing method called Mailsploit. We have seen this against both Office 365 and Gmail customers. What m...

Blog Post2FWebinar Images (42).png

[Webinar] Future-Proofing Your Security for 2018

Michael Landewe | December 7, 2017 | Filed Under: Webinars, Blog, Videos | Read More »

You can’t predict when, but we can show you how the next attack might happen. In this webinar we discuss the security trends of 2017 that predict the most likely threats of 2018. W...

5 Phishing Attack Trends to Look out for in 2018

Michael Landewe | December 1, 2017 | Filed Under: Blog, phishing | Read More »

Avanan has caught a tremendous number of previously-unseen attacks this year, and as a result we have identified some distinct trends that give insight into what we can expect in 2...

Attack Report: Phishing Your HR Platform in the Cloud

Dylan Press | November 10, 2017 | Filed Under: Blog, phishing, Attack Report | Read More »

Avanan’s Security Analysts recently started tracking an increased number of attacks against cloud-based HR systems such as ADP, Workday, Zenefits and Justworks, to compromise HR ac...