Threat Protection
Executive phishing, aka whaling, is a sophisticated form of spear-phishing that targets high-ranking company executives. Find out how to spot and protect your business from whaling attacks.
16
Min read
Threat protection
Supply chain attacks can have a devastating impact on a company - and even the economy. In this article, we’ll discuss supply chain attacks and how to prevent them.
Learn about spear-phishing, a dangerous form of phishing that targets a selected individual to steal their access credentials or other sensitive information.
This article explains why cybersecurity is important for small businesses, what the threats are, and how to counter them.
7
Brute force attacks are simple and inexpensive attacks that use trial and error to guess login credentials, encryption keys, or session IDs.
8
The Threat Blocker log boosts your situational awareness by keeping track of threat activity and policy violations in your IT infrastructure.
2
Learn how to enhance GoodAccess’ built-in domain-level protection from malware and phishing by adding your own blocklists and importing custom DNS records.
3
Phishing scams remain one of the most widespread tactics attackers use against companies. Learn the 6 best practices businesses need to adopt to stay safe.
12