Blog

In mid-October, Microsoft revealed that it had succeeded in mitigating a 2.4 Tbps distributed denial-of-service (DDoS) attack against its own infrastructure.
Read more
What does it take for an IT project to be successful? In this blog a program director answers questions like who should be involved and which plan model to use.
Read more
Read about 3 recent cyber attacks where Google was leveraged and abused - and get prepared for upcoming threats around new Google 2FA requirement.
Read more
Phishers launched an attack campaign impersonating Danish international container shipping company Maersk Line to steal victims’ email account credentials.
Read more
Learn what different types of phishing attacks can look like and how to help your team avoid falling for them.
Read more
If you want your email to be secure, then adopting encrypted email practices is critical.
Read more
Spoofing is the insidious act of disguising a communication from an unknown source as being from a known, trusted source.
Read more
Recently, I wrote about Microsoft’s discovery of a new phishing-as-a-service (PhaaS) offering called “BulletProofLink.” PhaaS functions similarly to
Read more
What is ransomware? This blog tells you what it looks like, how to avoid it, and ways to recover.
Read more
Digital attackers launched a phishing campaign in which they abused DocuSign to steal victims’ email account credentials.
Read more
A proposed bill would require victims of ransomware to disclose that they had paid a ransom within a 48-hour window.
Read more
Is choosing to specify in a specific vertical the best strategy for MSPs to grow their business? We spoke with a MSP leader to learn about the pros and cons.
Read more