<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">

As an administrator, how can you standardize healthy account management at your organization and reduce the risk of account compromise? What configurations and settings p...

Read more

Use Case Video Title Cards (1)

How to Find and Quarantine Emails from Compromised Accounts in Office 365

When you first deploy Avanan, you can conveniently identify and quarantine malicious content that was lurking in any mailbox at your organization. When an Office 365 account is com...

Read more

slack-secure-featured

Is Slack Secure?

Slack is now the most popular and fastest growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations, it's replaced ...

Read more

Intro Card 2

How to Create a Policy to Quarantine Phishing and Malware Emails in Office 365

Learn how to create a policy that quarantines phishing and malware emails before they hit your users' Office 365 inboxes. This goes beyond just the emails that Microsoft identifies...

Read more

link-featured-img

Why Does Link Scanning Miss so Many Phishing Attacks?

Link scanning is a security feature that identifies the safety of a link attached in an email. This protects users in the event that hackers would install malware or credential har...

Read more

final intro card

How to Monitor Successful Logins to Office 365 Coming from Outside the US

In this short video, we show you how to easily monitor successful logins to Office 365 from outside the United States. Although employee logins from outside the US are increasingly...

Read more

proxy-featured

Why Proxies Cause Security Vulnerabilities

Proxies have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies have become exceedingly...

Read more

podcast-indepth-iaas-saas

[Podcast] An In-Depth Discussion on IaaS & SaaS: How to Protect Them

In this podcast, hosted by BioMetricNews.net, we discuss the theme of using the cloud to fortify the lines of defenses at your business or corporation.

Read more

GDPR-featured

Is the US Version of GDPR on the Horizon?

It is starting to look like the US, following in the footsteps of the EU, may crack down on how tech companies collect personal data. The National Telecommunications and Informatio...

Read more

SINET-featured

SINET Names Avanan a Top 16 Cybersecurity Innovator

New York, September 26, 2018—SINET announced the recipients of the 2018 SINET 16 Innovator Award, which recognizes sixteen early stage and emerging technology companies poised to m...

Read more

Blog Post2FWebinar Images (100)

What Are Botnets and How to Defend Against Them

In 2016, the infamous Mirai botnet briefly derailed the internet, shutting down Dyn servers responsible for internet traffic and much of the internet’s infrastructure. Despite the ...

Read more

Prevent Phishing

Stop Phishing with Avanan's Anti-Phishing Software

In March of 2018, an employee at The Financial Services Information Sharing and Analysis center (FS-ISAC) clicked on a malicious link. From there, the phished email spread in waves...

Read more

Blog Post2FWebinar Images (95)

6 Cyber Security Tips for Employees

Regardless of their age, role, or cyber security competency, employees must follow basic practices to protect your organization and its data. Training doesn’t have to come in the f...

Read more

Blog Post2FWebinar Images (91)

PhishPoint: New SharePoint Phishing Attack Affects an Estimated 10% of Office 365 Users

  Over the past two weeks, we detected (and blocked) a new phishing attack that affected about 10% of Avanan's Office 365 customers. We estimate this percentage applies to Office 3...

Read more

Blog Post2FWebinar Images (87)

Fake Invoices: Why Does Office 365 Keep Missing These Phishing Attacks?

Emails with fake invoices has been one of the most popular attack vectors against Office 365 email users for the past several years. The malicious emails are disguised as invoices ...

Read more

Blog Post2FWebinar Images (84)

ACE Archives: Microsoft finally closes hole that allowed trojans to bypass Office 365 default security

For several weeks, we detected (and blocked) an attack targeting one of the largest municipalities in the U.S. that bypassed Office 365 default security, using a simple yet extreme...

Read more

Blog Post2FWebinar Images (86)

What is Shadow IT and Why Does it Exist?

Despite its menacing name, the practice of Shadow IT—when employees work with unsanctioned software, hardware, or applications on personal or company devices—is as reasonable as th...

Read more

Blog Post2FWebinar Images (76)

Throwback Thursday: The DNC email hacks by Russian hacking firms

In 2016, we wrote a blog post and hosted a webinar summarizing the Russian hacks against the DNC. Two years later, Mueller's indictments have have both confirmed the initial report...

Read more

Blog Post2FWebinar Images (74)

What is a Cloud Access Security Broker (CASB)? | Infographic

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats. Gartner first defined the term Cloud Access ...

Read more

Blog Post2FWebinar Images (72)

4 Major Ways Phishing Attacks Have Evolved In The Last Ten Years

Ten years is an eternity when it comes to technology. Back in 2008, the Motorola Razor was the most popular cellphone on the market and Blu-Ray was set to be the future of home ent...

Read more