News & Resources

Cyber Security Risks for Businesses Who Do Not Have a Lot of Income.

Cyber Security Risks for Businesses Who Do Not Have a Lot of Income.

Cybersecurity essentials for small businesses Cybersecurity is one phrase that can instill everything from boredom to fear into the hearts of the people who hear it. In reality, small business cybersecurity can be a life-or-death concept. The wrong security breach at...

HIPAA and Email Security. HIPAA Standards For Email Security.

HIPAA and Email Security. HIPAA Standards For Email Security.

What is HIPAA? HIPAA (the Health Insurance Portability and Accountability Act) was amended in 2013 to include several stringent rules regarding the sharing of personal medical information via email. While it doesn’t prevent the use of emails, these rules make emailing...

Spear phishing

Spear phishing

What is spear phishing? Spear phishing is a targeted attack delivered via email - commonly using some piece of information like the recipients name, their bank, a company they work with etc. People are much more likely to fall for these type of attacks than general...

What are Malicious Attachments? How to Identify and Prevent Them.

What are Malicious Attachments? How to Identify and Prevent Them.

What is a malicious attachment? Malicious attachments typically come along with phishing emails. They may come in the form of a fake invoice, or word doc and contain threats like ransomware, malware, keyloggers and other threats. How do I identify a malicious email...

What are Malicious URLs and Links? How to Identify and Fight Them.

What are Malicious URLs and Links? How to Identify and Fight Them.

What is a malicious URL? A malicious URL is a link created with the purpose of promoting scams, attacks, and frauds. When clicked on, malicious URLs can download ransomware, lead to phishing or spearphishing emails, or cause other forms of cybercrime. Malicious URLs...

Email Phishing

Email Phishing

What is phishing? Phishing is a scam where psychological manipulation is used to scare or trick victims into giving away sensitive data like passwords or paying money through the use of fraudulent invoices. What types of phishing are there? Spear phishing - These are...

5 Ways To Reduce Email Phishing. What is the goal of phishing?

5 Ways To Reduce Email Phishing. What is the goal of phishing?

What is email phishing? Email phishing is one of the biggest digital threats of the 21st century. Simply put, a phishing event is when someone attempts to get sensitive information by pretending to be someone or something trustworthy through email. Often, phishing...

What is Business Email Compromise?

What is Business Email Compromise?

Business Email Compromise Business Email Compromise (BEC) is a fancy new name for an old technique: the confidence game. And it’s a really lucrative and popular way to commit cybercrime. More than 22,000 targeted organizations in the past 3 years More than $3 billion...

How to Prepare Your Email Security for GDPR

How to Prepare Your Email Security for GDPR

What does GDPR mean for email security? The European Union has put into place one of the strictest data protection laws in history. The General Data Protection Regulation (GDPR) is a law that takes effect on May 25, 2018. If your business collects any types of...

7 Email Security Best Practices

7 Email Security Best Practices

What are the best practices for email security? Every year, there are new security threats to your company. From denial of service to ransomware, your information is under potential attack at every hour of every day. Like a hole in a wall, the number one point of...

Alternative to Solarwinds Mail Assure

Alternative to Solarwinds Mail Assure

What is an alternative to Solarwinds Mail Assure? Email Security is a very dynamic industry leading to the rise and fall of companies large and small over the past 20 years. Clearnetwork with its service ContentCatcher have weathered the storm, managing migrations...