In the not too distant past, traditional work offices and co-working spaces were the norm, along...
read more
How to Detect Risky URLs in Your Email: Top 3 Things to Check
At some point, email, the world's most widely used productivity tool, became the world's biggest...
Beyond Known Bad: Historic Communications and Email Security
In most things in life, absolute certainty is rare. Decisions are made without perfect...
How to Train your Users Right Before They Get Phished
This is the third in our five-part series evaluating anti-phishing tools. To start at the...
Rethinking Security Training with an All Remote Workforce
For most organizations, this week marks the fourth week of widespread and nearly universal...
Securing the Zoom Environment When Your Workforce is All Remote
Over the past few weeks, a tremendous number of changes have taken place around the world. For...
Security Notification or Phishing Scam? How Cybercriminals Trick the Security Savvy
Phishing campaigns come in a wide variety of flavors – from volumetric voicemail scams to clever...
Flipping the Script on Security Awareness Training
Ticking boxes and taking names? When it comes to security awareness training, are companies...