Discover our blog

Phishing

4 Ways Hackers Break Through Fingerprint and Reputation Defenses

Email security remains a top concern for organizations around the world. Ransomware, which had been waning in recent...

Phishing

Healthcare Phishing: Protecting SMBs From Targeted Office 365 Attacks

While it doesn’t get the media attention of attacks on large healthcare organizations, cyberattacks on small, private...

Phishing

5 Common Phishing Techniques

Most email security filters are highly effective at ensuring that spam messages never make it to the inbox. However,...

Email Security

Two-Factor Authentication: The Pros and Cons of 2FA Schemes

“Implement two-factor authentication.” This is the advice given by cybersecurity experts around the world when a...

MSP Cybersecurity

How MSPs Can Sell Cybersecurity to Overly Optimistic SMBs

Stop me if you’ve heard this one before: “It won’t happen to us.” This is a common refrain among SMBs that are...

Malware - Ransomware

4 Ways Hackers Use Phishing to Launch Ransomware Attacks

MSPs have been on the receiving end of relentless ransomware attacks in 2019. In June, hackers infiltrated a number of...

MSP Cybersecurity

Microsoft Inspire 2019: The Future of Partnership

In July, I had the pleasure of participating in Microsoft Inspire 2019, a conference dedicated to partners and...