Latest Blog Posts

  • Posted by Admin
  • On September 25, 2017
Become an Email Security MSP or VAR – IT Channel Transition
Becoming an Email Security MSP or VAR In late 2016 the Spambrella partner...
Read more
  • Posted by Admin
  • On June 27, 2017
Petya ransomware outbreak: Here’s what you need to know…
Petya ransomware impacting large organizations in multiple countries – This page is updated...
Read more
  • Posted by Admin
  • On May 16, 2017
WannaCry FAQ: What you need to know today!
WannaCry FAQ: What you need to know today Friday May 12th will be...
Read more
  • Posted by Admin
  • On May 14, 2017
WannaCry Ransomware Infects Thousands Especially UK’s NHS
WannaCry (WanaCrypt0r 2.0) ransomware infects over 250k and has been detected in about 100...
Read more
  • Posted by Admin
  • On November 10, 2016
MxLogic drawing to a close…But where next? What are the MxLogic alternatives?
MxLogic slowly draws to a close leaving many in the clutches of alternative...
Read more
  • Posted by Admin
  • On June 30, 2016
Email Threat Protection – Methods to protect your Business
In a previous article we wrote about how to protect your business from...
Read more
  • Posted by Admin
  • On June 30, 2016
Encrypting Emails – When should you start?
How do you access your business emails? Chances are, you use several different...
Read more
  • Posted by Admin
  • On June 29, 2016
Email Governance & Effective Policies – 10 Tips
Email governance is your business’ protection against business brand reputation, email compliance and...
Read more
  • Posted by Admin
  • On June 29, 2016
Email spoofing: What is it and how to prevent it
Have you ever had an email that looks like it’s from a friend,...
Read more
  • Posted by Admin
  • On June 27, 2016
Protection from Email Attachment Malware.
Cybercriminals are getting cleverer. Phishing campaigns are getting increasingly targeted and they are...
Read more
  • Posted by Admin
  • On June 20, 2016
What is a Whaling Attack?
A whaling attack is a type of phishing scam – hence the name,...
Read more
  • Posted by Admin
  • On June 20, 2016
Malware detection! Beware of .js file attachments
Have you ever received an email with a .js file as the attachment...
Read more
  • Posted by Admin
  • On June 8, 2016
Are you ready for the McAfee SaaS service end of life?
In order to further their goal of creating an integrated, fast, full-featured computer...
Read more
  • Posted by Admin
  • On June 8, 2016
5 Convincing Phishing Emails to Watch Out For…
Fraudsters are getting cleverer. Phishing emails are moving from easy-to-spot, plain text emails...
Read more
  • Posted by Admin
  • On June 8, 2016
McAfee SaaS end of life: What does it mean for your business?
This article explains the benefits and options available to you transitioning from Intel...
Read more
  • Posted by Admin
  • On June 8, 2016
What is a phishing email and why are they dangerous?
Phishing emails (also called ‘spoof emails’) are sent by fraudsters with the aim...
Read more