tag = "Spear Phishing Protection"

The Anatomy of a Look-alike Domain Attack

In this post, we show the frequency of common look-alike domain threats, the mechanics of an attack, and resources to minimize risk.

How To Make Reporting a Phish So Easy Even Your Busiest Execs Will Do It

Reported phishing emails are the backbone of any anti-phishing program. But actually getting those emails? Not as easy as you'd think.