24 years
97.9 Customer Satisfaction Score
200k Tickets Closed
83% resolved remotely
97% Resolved within SLA Goal

OAuth Phishing Attacks: Threat Advisory

What You Need To Know About OAuth Phishing Attacks Amnesty International has reported that OAuth Phishing attacks targeted dozens of Egyptian human rights defenders since the beginning of this year. They are warning that these human rights defenders…

OAuth Phishing Attacks: Threat Advisory

What You Need To Know About OAuth Phishing Attacks Amnesty International has reported that OAuth Phishing attacks targeted dozens of Egyptian human rights defenders since the beginning of this year. They are warning that these human rights defenders…

Top Ways to Avoid Phishing Scams (Including Spear Phishing)

Phishing scams — and, increasingly, spear-phishing scams — are the number one way that cyber hackers gain access to closed computer systems, steal information and money, and corrupt data. Let’s take a look at what phishing and spear-phishing…

Top Ways to Avoid Phishing Scams (Including Spear Phishing)

Top Ways to Avoid Phishing Scams (Including Spear Phishing) Phishing scams — and, increasingly, spear-phishing scams — are the number one way that cyber hackers gain access to closed computer systems, steal information and money, and corrupt data.…

Arming the Next Generation of Cyber Warriors

There are everyday warriors in businesses across the country, but these individuals may never have worn the uniform of their country. This next generation of cyber warriors is being groomed by organizations of all sizes in an attempt…