Check out their latest posts here:

Social Engineering Phishing
Email Security

Social Engineering: What is Phishing?

Phishing is the most well-known social engineering attack, where a cyberattacker pretends to be a reliable source to make their victims reveal their personal information or download malware. According to the National Institute of Standards

Read More
Email Security

Social Engineering: What is Shoulder Surfing?

Shoulder surfing is the practice of stealing sensitive information by looking over another person’s shoulder while they are keying that information into the device. What is Shoulder Surfing? You’re on a bus, reading the newspaper

Read More
How to recognize Social Engineering attacks
Email Security

How to Recognize Social Engineering Attacks?

If you’re like most people, you probably don’t know much about social engineering. Or you believe it only aims to dupe unsuspecting victims to steal some money. But what you may not realize is that

Read More
How to stop email spoofing
Email Security

What is Email Spoofing and How to Spot it?

Email spoofing is a cyberattack in which a malicious actor impersonates a legitimate sender. They hide their identity by sending an email from a fake email address. They trick you into believing the email address

Read More
Harden your Mailfence account
Email Security

Harden Your Mailfence Account

Mailfence offers a secure and private collaborative suite, and all user accounts are protected through standard security and privacy measures (check our high-level security analysis for more information). However, as ever with any other digital

Read More
Social engineering scareware
Email Security

Social Engineering: What is Scareware?

Scareware is a social engineering technique that aims to scare the victim into believing they have a virus on their device and should buy or download specific software. As many social engineering techniques. It’s based

Read More
Prevent ransomware attacks
Email Security

Top 5 Ways To Prevent Ransomware Attacks

Ransomware is software developed to scramble infected computer systems, computers, tablets, or smartphones screen content or files so that data become unreadable. Hackers can then claim a ransom to unlock them. Last year, the number

Read More
Hacked email
Email Security

Steps To Take When Your Email Is Hacked

Think your email account may have been hacked? Most of us use email so often and from so many machines that it might be hacked one day. But don’t panic. Even if having your privacy

Read More