Blog
![](/sites/default/files/styles/resource_image/public/2021-11/ddos.jpg?itok=7jyROkC4)
In mid-October, Microsoft revealed that it had succeeded in mitigating a 2.4 Tbps distributed denial-of-service (DDoS) attack against its own infrastructure.
Read more![](/sites/default/files/styles/resource_image/public/2021-11/pm_stock.jpg?itok=fTwyWtci)
What does it take for an IT project to be successful? In this blog a program director answers questions like who should be involved and which plan model to use.
Read more![](/sites/default/files/styles/resource_image/public/2021-11/google_tablet_keyboard.jpg?itok=bE0C2kQj)
Read about 3 recent cyber attacks where Google was leveraged and abused - and get prepared for upcoming threats around new Google 2FA requirement.
Read more![](/sites/default/files/styles/resource_image/public/2021-11/maersk_2.jpg?itok=dAasDElp)
Phishers launched an attack campaign impersonating Danish international container shipping company Maersk Line to steal victims’ email account credentials.
Read more![](/sites/default/files/styles/resource_image/public/2021-10/man_sightseeing_binoculars.jpg?itok=JZoTSwmC)
Learn what different types of phishing attacks can look like and how to help your team avoid falling for them.
Read more![](/sites/default/files/styles/resource_image/public/2021-10/man_on_laptop_overlay.jpg?itok=pUJD8TUW)
If you want your email to be secure, then adopting encrypted email practices is critical.
Read more![](/sites/default/files/styles/resource_image/public/2021-10/man_fake_nose.jpg?itok=v203bpII)
Spoofing is the insidious act of disguising a communication from an unknown source as being from a known, trusted source.
Read more![](/sites/default/files/styles/resource_image/public/2021-10/thumb_white.jpg?itok=Qo9LTh8g)
Recently, I wrote about Microsoft’s discovery of a new phishing-as-a-service (PhaaS) offering called “BulletProofLink.” PhaaS functions similarly to
Read more![](/sites/default/files/styles/resource_image/public/2021-10/ransomware_image.jpg?itok=MpPas3bm)
What is ransomware? This blog tells you what it looks like, how to avoid it, and ways to recover.
Read more![](/sites/default/files/styles/resource_image/public/2021-10/docusign_3.png?itok=Z4LyRZfU)
Digital attackers launched a phishing campaign in which they abused DocuSign to steal victims’ email account credentials.
Read more![](/sites/default/files/styles/resource_image/public/2021-10/office_book_and_scales.jpg?itok=fsBJg-g3)
A proposed bill would require victims of ransomware to disclose that they had paid a ransom within a 48-hour window.
Read more![](/sites/default/files/styles/resource_image/public/2021-10/people_working.png?itok=BwLPb3tX)
Is choosing to specify in a specific vertical the best strategy for MSPs to grow their business? We spoke with a MSP leader to learn about the pros and cons.
Read more