Back to blog

Posts in the category
"Phishing"

Phishing

Email Scams: Phishing for Victims in Election Year

The 2020 election is closely approaching in the US. That means continuing cybersecurity concerns for both citizens and...

Phishing

Color Schemes: Detecting Logos in Phishing Attacks

If a staff member correctly identifies and reports a phishing email, it’s your lucky day—you and your business just...

Phisher's Favorites

Phishers’ Favorites: After Five Quarters, Microsoft is Unseated by PayPal

Today, we published our Phishers’ Favorites report for Q3 2019. Now in its sixth edition, Phishers’ Favorites ranks...

Phishing

4 Ways Hackers Break Through Fingerprint and Reputation Defenses

Email security remains a top concern for organizations around the world. Ransomware, which had been waning in recent...

Phishing

Healthcare Phishing: Protecting SMBs From Targeted Office 365 Attacks

While it doesn’t get the media attention of attacks on large healthcare organizations, cyberattacks on small, private...

Phishing

5 Common Phishing Techniques

Most email security filters are highly effective at ensuring that spam messages never make it to the inbox. However,...

Malware - Ransomware

4 Ways Hackers Use Phishing to Launch Ransomware Attacks

MSPs have been on the receiving end of relentless ransomware attacks in 2019. In June, hackers infiltrated a number of...