Discover our blog

Email Security

The case for a cloud email security supplement (CESS)

The high-volume phishing waves of the past have been replaced by sophisticated attacks that even superior technologies...

MSP Cybersecurity

Exchange Online Protection (EOP): Alternatives for Busy MSPs

Nearly every organization utilizing Microsoft 365 for their email service is eventually faced with a question: are ...

Email Security

Mitigating the Dangers of an Insider Threat

The term “insider threat” in email security brings to mind malicious employees, but the truth is more complicated....

Spear Phishing

Business Email Compromise: An Old Threat Finds New Targets

Business Email Compromise or BEC presents a radically more sophisticated version of the age-old “Nigerian Prince”...

Spear Phishing

Top Tricks Used in CEO Fraud

CEO fraud is a type of spear phishing attack in which a hacker impersonates a CEO via email and persuades a victim to...

MSP Cybersecurity

The XaaS Consumption Model: Monetizing the Seat

Research has shown that there are 78 million SMB users—or seats—in the US market, each with an average technology...

Microsoft 365

Office 365 Phishing Attacks: How Hackers Get Access to Your Business

With 258 million corporate users, the highly popular Microsoft platform has become a target-rich environment for...