New & Notable
Email and messaging threats News
September 20, 2021
A recent spate of phishing attacks and SMS fraud scams in Spain is being blamed on cybercriminals who were operating from the Canary Islands with backing from the Italian mob.
August 31, 2021
Back to fool: University students with little security training are being targeted by Nigerian scammers to move fraudulent funds with the lure of quick bucks and flexible hours.
June 24, 2021
Security researchers this month noted drastic improvements in the domain registrar's effort to respond to and mitigate reports of malicious and fraudulent sites.
June 22, 2021
New research from Cisco Talos shows cybercriminals are still using the COVID-19 pandemic for BEC attacks to steal millions, but in slightly different ways.
Email and messaging threats Get Started
Bring yourself up to speed with our introductory content
An email virus consists of malicious code distributed in email messages to infect one or more devices. Continue Reading
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else. Continue Reading
Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients. Continue Reading
Evaluate Email and messaging threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In addition to protecting an organization's endpoints from threats, IT administrators can use endpoint security tools to monitor operation functions and DLP strategies. Continue Reading
The rumors of Office 365's death have been greatly exaggerated. Microsoft still offers an Office 365 E3 plan, but how does it stack up to the Microsoft 365 E3 plan? Continue Reading
Malicious actors are taking advantage of coronavirus fears to wreak havoc on cybersecurity. Check out our guide to learn about phishing and ransomware threats and how to stop them. Continue Reading
Manage Email and messaging threats
Learn to apply best practices and optimize your operations.
Exchange security has come under increased scrutiny since the recent exploitation of critical vulnerabilities. Review this list of activities to best protect your enterprise. Continue Reading
In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities. Continue Reading
With ransomware expected to cost companies billions, incorporate these ransomware prevention best practices to keep attackers away. Continue Reading
Problem Solve Email and messaging threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Ransomware can cost companies billions in damage. Incorporate these ransomware prevention best practices to keep attackers out. Continue Reading
Cato Networks' Etay Maor explains how cybercriminals use open source intelligence to detect and attack vulnerable enterprise networks and employees. Continue Reading
The unique nature of your on-premises Exchange Server makes it an attractive target for threat actors. Take these recommended steps to avoid being the next breach victim. Continue Reading