Skip to content
How to Defend Against Reply-Chain Phishing When It's Hard to Spot

How to Defend Against Reply-Chain Phishing When It’s Hard to Spot

Just about everyone is now familiar with the term “phishing.” These are messages that employ social engineering tactics to trick people into doing things, such as clicking on malicious links, downloading dangerous attachments, or sending passwords or other personal details. Phishing is unfortunately very common. Last year, 83% of organizations experienced phishing attacks coming through…

Read More
How To Improve Security With Application Whitelisting

How To Improve Security With Application Whitelisting

Traditional network protections have included stopping threats that are known. Legacy antivirus programs use a signature database of identified malware that is then used to match with incoming file attachments. Legacy firewalls would do a similar thing where the threats were cataloged in a database, then when an unknown application is spotted, it is matched…

Read More