Back to blog

Posts written
by Adrien Gendre

Spear Phishing

BEC Scam: How to Avoid Becoming a Victim

Imagine your employee receives an email from you instructing them to pay an outstanding vendor invoice. You’re...

MSP Cybersecurity

What is a Brute Force Attack? Common Types and How to Prevent Them

According to IBM’s Cost of a Data Breach 2022 Report, stolen or compromised account credentials are the most common...

Malware - Ransomware

Data Exfiltration: Why Ransomware is About More Than the Ransom

If you’re like most organizations, the term “ransomware” conjures up nightmares of hackers infiltrating your network,...

Phishing

Cyberthreats Target Black Friday: How to Protect Your Business and Employees

Despite this year’s economic and inflationary headwinds, forecasts predict Black Friday (a period spanning several...

MSP Cybersecurity

Clone Phishing: Protect Your Business from this Deceptive Cyberthreat

As a small-to-midsized business (SMB) or managed service provider (MSP), you fear this scenario. A clone phishing email...

MSP Cybersecurity

4 best email security tools you need in your stack

In the survey for our SMB Cybersecurity Landscape Report, we discovered that 69% of small-to-midsized businesses (SMBs)...

MSP Cybersecurity

Account Takeover Prevention: How to Protect Your Organization

As a managed service provider (MSP), protecting your clients’ cybersecurity is the top priority. With cyber threats...