Top 10 Phishing Email Subject Lines

How many emails do you receive each day? Did you know that one out of every 99 emails is a phishing attack? Phishing emails are everywhere and are still the most consistently effective cyberattack method we see daily. The subject lines are tricky as they appear to be legitimate emails that would generally be in your inbox, and it takes utmost vigilance and awareness to not click right on through one of these emails. To become more vigilant and cyber-aware, let’s take a look at the top 10 phishing email subject lines from Q1 of 2022.

Read more

Microsoft OneNote Just Got Even Better

Microsoft OneNote is a widely used application for note-taking, especially in the office setting. It is convenient to keep track of quick thoughts, take notes in a meeting, and compile ideas in any field. OneNote diehards, get excited!  This trusted application is improving! Let’s take a look at the newest improvements to Microsoft OneNote.

Read more

Evolution of the Hacker Trade

Sometimes change happens so gradually it’s easy to miss. That’s often the case in cybersecurity. We see statements like “the security landscape is evolving” or “hackers are getting smarter” that just get brushed off as the latest marketing jargon. Still, they hold some serious weight if you stop to think about it. 

Read more

Is There a Right Way to Set Up Two-Factor Authentication?

Lately, there's been a lot of chatter around two-factor authentication (2FA) and multi-factor authentication (MFA). We're seeing more and more websites and applications enforcing 2FA—like Google recently announcing 2FA will be turned on by default for all accounts. But that led us to wonder: How easy is it for malicious threat actors to circumvent 2FA?

Read more

What is Ransomware?

Ransomware is everywhere. In 2021, ransomware was involved in at least 10% of breaches. Businesses in Healthcare, Financial Services, and Professional/Legal Services are consistently on the list of "most at risk" of ransomware attacks. So what is ransomware? What are the specifics that we as businesses need to understand to educate ourselves and our organizations on this imminent risk?

Read more

Experts Weigh in on the State of Email-based Threats

Hackers often rely on email to be their delivery vehicle for malware. They develop a weaponized URL or attachment before delivering it via email to their unlucky targets. Email has become a hacker favorite in recent years because it is cheap and easy to use—and unfortunately, hackers know that users tend to click on links and attachments. But how do these phishing emails continue to get through traditional security layers, and what can defenders do to stop them? To help answer these questions, we brought in some experts.

Read more

Making Sense of Alphabet Soup

Let’s be honest, the cybersecurity marketplace is complex and confusing. Businesses are already struggling to make sense of security and defend themselves from modern attackers. It doesn’t help that they are also drowning in a sea of acronyms and jargon while doing it. MDR, EDR, NGAV, SIEM, the list goes on and it can feel like you’re staring at a bowl of alphabet soup.To help you make sense of today's complex security landscape, we've defined the key acronyms and capabilities that can be found in several of today's most crucial security categories.

Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company