Discover our blog

MSP Cybersecurity

The XaaS Consumption Model: Monetizing the Seat

Research has shown that there are 78 million SMB users—or seats—in the US market, each with an average technology...

Microsoft 365

Office 365 Phishing Attacks: How Hackers Get Access to Your Business

With 258 million corporate users, the highly popular Microsoft platform has become a target-rich environment for...
Email Security

3 Ways an Email Feedback Loop Boosts Security Awareness

Reporting an email threat is one of the most important steps users can take to help secure their businesses and...

Email Security

Why It’s So Hard to Spot a Spoofed Email

Email spoofing is single most common feature between phishing and spear phishing emails. The methods hackers use to...

Spear Phishing

Pretexting: 5 Examples of Social Engineering Tactics

Pretexting is a form of social engineering used to manipulate victims into divulging sensitive information. Hackers...

Phishing

Facebook Phishing: Why Social Media is a New Phishers' Favorite

For the second straight quarter, Facebook was the second most impersonated brand in phishing attacks in our quarterly ...

Email Security

Multiphase Attacks: One Email Ignites Chaos in Microsoft 365

A multiphase attack combines phishing with spear phishing and insider attack techniques. Difficult to detect and...