email security
Office 365 phishing
Let’s be honest: administering email is a pain. Routing issues, disk quotas, bouncebacks, the times when users can send but not receive emails, receive but not send, or they flat...
Cybercrime and Fraud Part 1: Modern Tales of Piracy and Plunder
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy....
“Spark Joy” With New 12.0 Email Security Features & Videos
When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0...
Email – From Novelty to Nefarious
How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at...
Your money or your life: Digital extortion scams
An insidious targeted phishing scam is growing in popularity: scammers leveraging threats against your reputation, your relationships, or even your life. Witness the transition from carrot to stick.
Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study
Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world.
You’ve Got (Compromised) Mail!
There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with...
Going with what works: The state of phishing
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...
Phishing 101: Protection for Everyone
For individuals, these simple steps can help protect you. They are not a complete solution, but they are helpful.