SPF, DKIM and DMARC: why are they important and how can you set them up?
What are SPF, DKIM and DMARC? How do they contribute to setting up protection against phishing attacks and how can you set them up for your company domain?
What are SPF, DKIM and DMARC? How do they contribute to setting up protection against phishing attacks and how can you set them up for your company domain?
Who are Initial Access Brokers and what do they do? What are some of their techniques, and how can you protect your company against them?
Why does a simple phishing email threaten an entire company? How do hackers move on from a low-level account to significant privileges, and, eventually, deploy a ransomware?
What is SMishing (SMS phishing) and how do hackers conduct these attacks?
What are the differences between the ISO 2007 and SOC2 standards? And which one is right for your company?
A quick look at how hackers can exploit the PDF format to deliver malware.
Microsoft Azure AD's Conditional Access is a great tool! But hackers have found ways around it. Here's how.
A bit lost navigating all the different kinds of phishing cyberattacks? Here's a quick guide to give you an overview of each: phishing, spear-phishing, whaling, smishing, vishing.
What is social engineering? How do hackers use this tactic in their phishing and spear-phishing attacks?
What is a Businesss Email Compromise cyberattack? How do hackers run these types of attacks and how can you protect your company from them?
What is OSINT (Open Source INtelligence) and how do hackers use it for their phishing attacks?
What is the right frequency and timing of your phishing simulation campaigns to make them the most effective? Mantra's data team has a look at this issue.