The Business of Hacking your Business

Whether its ransomware, credential compromise, distributed denial of service, or phishing: hacking your business has itself turned into a business. There are entire organizations dedicated to targeting networks and infrastructure. Because of the nature of the economy, there is always someone who benefits from a disruption. Government, businesses, and schools are all potential targets. No [...]

By |2018-12-18T12:04:59-06:00May 16th, 2018|Security Solutions|Comments Off on The Business of Hacking your Business

Hunting for Phishing in Office 365

The scariest aspect of a phishing attack is that it only takes a single employee clicking on a PDF attachment or enabling macros on an Excel document for your business to be infiltrated. One compromised inbox can result in days or weeks of headaches for your IT department. A ransomware attack can cost you in [...]

By |2018-12-18T12:07:22-06:00March 19th, 2018|Security Solutions|Comments Off on Hunting for Phishing in Office 365

Configuring Office 365 to help in the battle against phishing and spam

Battling spam and curbing phishing attacks seem to be continual challenges for many organizations. While there are many technical controls to help fight the good fight, end users are largely responsible for handling junk mail and keeping a watchful eye out for the evil that lurks within email messages. There are many products that front-end [...]

By |2019-05-06T09:42:09-06:00September 27th, 2017|Security Solutions|Comments Off on Configuring Office 365 to help in the battle against phishing and spam