News

Backups are in danger!

23. 11. 2021

Companies rely on their backup files when data or infrastructure are inoperative or missing (independently from the cause) to resume the activity. The recent pandemic has been a real "game changer" for data protection and backup strategy procedures...

Keep reading

Email Relays: What you will need to know

09. 11. 2021

The growing threat of cybercrime within Email calls for robust countermeasures. But email is still of paramount importance, and one of the systems in this sphere is an Email Relay, which is very important for certain organizations. Email marketing ...

Keep reading

Email spoofing: How to reduce the risks

26. 10. 2021

Attackers committing email spoofing typically start by finding a mail server with poorly configured servers that likely lack SMTP protection. Therefore, the best protection against email spoofing are frameworks that have been developed to authenticat...

Keep reading

Why Important AAA Standards, such as MTA-STS, are Essential for Email Security

12. 10. 2021

Discover how the AAA security processes and protocols improve email security by protecting recipients, email senders, and domain owners from phishing attacks, spoofing, and spam. Authentication, Authorization, and Accounting (AAA) is a security fra...

Keep reading

Testimony: My SMB got attacked by a ransomware

28. 09. 2021

One of our clients discloses all about the cyber-attack his company suffered. Wishing to remain anonymous to preserve his company's image with his own customers, he tells us his true story, the impact the ransomware had on his business, his mistakes...

Keep reading

The surge in native language phishing emails

21. 09. 2021

The first "Spear" in SpearPhishing is adapting the attack to the victim language, and this is a growing trend for phishing emails. According to Google’s research on who is being targeted by email phishing attacks, there were 18 million COVID-19-rela...

Keep reading

How to avoid becoming a victim of email phishing scams

07. 09. 2021

The global pandemic has led to the historic transition to remote work. According to Gartner, once COVID-19 was declared a global pandemic, 88% of companies worldwide either made it compulsory or persuaded their employees to work from home. Unfortunat...

Keep reading

What is a 3-2-1 backup strategy and what is it for?

24. 08. 2021

With the growing number of cyber-attacks and ransomware encrypting data and backup files, companies have no choice but to review their backup plans and implement the 3-2-1 backup strategy. The 3-2-1 Backup Strategy for full disaster protection Empl...

Keep reading

What is Malware and how to be aware

10. 08. 2021

For businesses, Malware threats can leave vulnerable systems and data exposed and can cause major monetary and reputation losses. For businesses, attacks like malware threats can leave vulnerable systems and data exposed and can cause major monetary...

Keep reading

Email insider threats and how to defeat them

27. 07. 2021

While businesses and organizations focus their attention on stopping hackers outside the company from breaching their security defenses, very few have any kind of protection against insider threats. There are three major types of insider security th...

Keep reading