News & Resources
Healthcare and Cybersecurity. Email Security in This Industry.
Scenic Bluffs notifies patients of security breach By County Line | Posted April 27th, 2018 | Editor’s note: Scenic Bluffs Community Health Centers prepared the following press release on its security breach in late February. Cyber attackers gained limited...
Cyberthreats to Manufacturing Industry via Email: How to Avoid Them?
Email Security Best Practices for Cyber Security for advanced manufacturing Manufacturing is the 2nd most attacked industry right behind healthcare, and in most cases, they are the least prepared. With email being the top delivery method of these attacks, it must a...
Appropriate Protection for Your Cloud Email Security Concerns.
In this comprehensive guide to choosing email security, we’ll go over the options available and how to choose. Not every solution is for every firm, but a complete understanding of the possibilities will help you chose what is likely to work best for you. Throughout...
Cyber Security Risks for Businesses Who Do Not Have a Lot of Income.
Cybersecurity essentials for small businesses Cybersecurity is one phrase that can instill everything from boredom to fear into the hearts of the people who hear it. In reality, small business cybersecurity can be a life-or-death concept. The wrong security breach at...
Email Security Awareness Training for Your Employees: The Importance and Reducing the Risks of Successful Cyber Attacks.
Why training email users is a necessity – Email Security Awareness Training While there is a lot to be said on the subject, the simplest reason that you need to train your email users is that email is the number one entry point for cyber threats and humans are the...
HIPAA and Email Security. HIPAA Standards For Email Security.
What is HIPAA? HIPAA (the Health Insurance Portability and Accountability Act) was amended in 2013 to include several stringent rules regarding the sharing of personal medical information via email. While it doesn’t prevent the use of emails, these rules make emailing...
Spear phishing
What is spear phishing? Spear phishing is a targeted attack delivered via email - commonly using some piece of information like the recipients name, their bank, a company they work with etc. People are much more likely to fall for these type of attacks than general...
What are Malicious Attachments? How to Identify and Prevent Them.
What is a malicious attachment? Malicious attachments typically come along with phishing emails. They may come in the form of a fake invoice, or word doc and contain threats like ransomware, malware, keyloggers and other threats. How do I identify a malicious email...
What are Malicious URLs and Links? How to Identify and Fight Them.
What is a malicious URL? A malicious URL is a link created with the purpose of promoting scams, attacks, and frauds. When clicked on, malicious URLs can download ransomware, lead to phishing or spearphishing emails, or cause other forms of cybercrime. Malicious URLs...
Email Phishing
What is phishing? Phishing is a scam where psychological manipulation is used to scare or trick victims into giving away sensitive data like passwords or paying money through the use of fraudulent invoices. What types of phishing are there? Spear phishing - These are...
5 Ways To Reduce Email Phishing. What is the goal of phishing?
What is email phishing? Email phishing is one of the biggest digital threats of the 21st century. Simply put, a phishing event is when someone attempts to get sensitive information by pretending to be someone or something trustworthy through email. Often, phishing...
What is Business Email Compromise?
Business Email Compromise Business Email Compromise (BEC) is a fancy new name for an old technique: the confidence game. And it’s a really lucrative and popular way to commit cybercrime. More than 22,000 targeted organizations in the past 3 years More than $3 billion...











