Going with what works: The state of phishing
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...
Phishing 101: Protection for Everyone
For individuals, these simple steps can help protect you. They are not a complete solution, but they are helpful.
Don’t Feed the Phish: Implementing DMARC
The Challenge of implementing SPF and DKIM: It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not...
Four Ways to Simplify Security
Security breaches dominate headlines. From TechWorld's list of infamous data breaches to Wired Magazine's story about thrill-seeking teen hackers, evidence exists that it's difficult to secure everything.
Defending Against The $5B Cybersecurity Threat – Business Email Compromise
If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has […]
Cisco Email Security is Top Solution
Billions of corporate messages flow back and forth on a daily basis. And with over 90% of breaches starting with an email, organizations today face a daunting challenge when choosing the best email security solution to stop emails with phishing links or malicious attachments that unleash ransomware, phishing or business email compromise attacks. Securing the […]
For threat correlation across endpoint, network, and cloud – connect the dots
When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]