Secure Your Collaborative Workspace with Full-Suite Protection

2026-02-16T19:19:07-07:00February 3rd, 2026|Tags: , , , , , , , , , , , , , |

Cloud collaboration platforms like Microsoft 365, Google Workspace, Teams, SharePoint, OneDrive, and Slack have become critical to daily operations—but they also introduce new security risks beyond traditional email. Check Point’s Cloud Collaboration Security (Harmony Email & Collaboration) provides a unified [...]

Harmony Email Security is a Preventative Solution!

2024-07-24T17:32:39-06:00July 23rd, 2024|Tags: , , , , , , , , , , , , |

Did you know Harmony Email Security (HEC) is used by over 30,000 Enterprises? Millions of email mailboxes protected every day. Harmony Email Security is a PREVENTATIVE solution, not reactive. Harmony Email Security is designed to protect email and collaboration platforms [...]

What did you learn? Password Spraying and Cyber Forensics

2024-05-30T16:19:37-06:00March 12th, 2024|Tags: , , , , , , , , , , , , , |

Years ago while learning how to be a young married couple about to have a child we attended dinner with a friend and her family. During our time together one of their children fell and hurt himself, not seriously, however, [...]

Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard

2024-03-14T13:08:08-06:00January 19th, 2024|Tags: , , , , , , , , , , , |

Human error - or perhaps just a friendly reminder that we all need continuous learning and peer review.   The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response [...]

What is Data Loss Prevention (DLP)? Lack of data protection policies can become a big problem!

2023-03-15T11:35:29-06:00March 13th, 2023|Tags: , , , , , , , , , , , |

What is Data Loss Prevention? Data loss prevention (DLP) is a cybersecurity methodology that combines technology and best practices to prevent the exposure of sensitive information outside of an organization, especially regulated data such as personally identifiable information (PII) and [...]

Phishing, Malware, Ransomware / Who do you Trust for Email Security and Protection?

2023-03-13T15:56:43-06:00February 28th, 2023|Tags: , , , , , , , , , , , |

The need for Email Security is greater now than ever before. As more companies move from "in-house - dedicated email servers" to cloud based email, new technologies must be employed to protect you data and sensitive information. Email is one [...]

What appears as document from DocuSign is really a phishing attack with embedded htm malware

2023-01-25T17:19:41-07:00January 19th, 2023|Tags: , , , , , , , , , , , |

The Blank Image Attack is where hackers are placing blank images within HTML attachments. When opening the attachment, the user is automatically redirected to a malicious URL. Vector: Email Type: Malware Techniques: Social Engineering, Blank Image, HTML Redirect Target: Any [...]

Go to Top