Blog
In mid-October, Microsoft revealed that it had succeeded in mitigating a 2.4 Tbps distributed denial-of-service (DDoS) attack against its own infrastructure.
Read moreWhat does it take for an IT project to be successful? In this blog a program director answers questions like who should be involved and which plan model to use.
Read moreRead about 3 recent cyber attacks where Google was leveraged and abused - and get prepared for upcoming threats around new Google 2FA requirement.
Read morePhishers launched an attack campaign impersonating Danish international container shipping company Maersk Line to steal victims’ email account credentials.
Read moreLearn what different types of phishing attacks can look like and how to help your team avoid falling for them.
Read moreIf you want your email to be secure, then adopting encrypted email practices is critical.
Read moreSpoofing is the insidious act of disguising a communication from an unknown source as being from a known, trusted source.
Read moreRecently, I wrote about Microsoft’s discovery of a new phishing-as-a-service (PhaaS) offering called “BulletProofLink.” PhaaS functions similarly to
Read moreWhat is ransomware? This blog tells you what it looks like, how to avoid it, and ways to recover.
Read moreDigital attackers launched a phishing campaign in which they abused DocuSign to steal victims’ email account credentials.
Read moreA proposed bill would require victims of ransomware to disclose that they had paid a ransom within a 48-hour window.
Read moreIs choosing to specify in a specific vertical the best strategy for MSPs to grow their business? We spoke with a MSP leader to learn about the pros and cons.
Read more