Read about 3 recent cyber attacks where Google was leveraged and abused - and get prepared for upcoming threats around new Google 2FA requirement.
Read morePhishers launched an attack campaign impersonating Danish international container shipping company Maersk Line to steal victims’ email account credentials.
Read moreIn this case study, a small healthcare business IT leader talks about her trust in Zix email threat protection for to fill security gaps with simplicity.
Read moreLearn what different types of phishing attacks can look like and how to help your team avoid falling for them.
Read moreIf you want your email to be secure, then adopting encrypted email practices is critical.
Read moreSpoofing is the insidious act of disguising a communication from an unknown source as being from a known, trusted source.
Read moreZix introduces Secure Large File as part of email encryption service, improving collaboration as any authorized user can send large attachments from their email.
Read moreRecently, I wrote about Microsoft’s discovery of a new phishing-as-a-service (PhaaS) offering called “BulletProofLink.” PhaaS functions similarly to
Read moreWhat is ransomware? This blog tells you what it looks like, how to avoid it, and ways to recover.
Read moreDigital attackers launched a phishing campaign in which they abused DocuSign to steal victims’ email account credentials.
Read more