Threat protection
A port scan is a networking technique that determines what ports on a device are open. Cybercriminals also use port scanning to identify targets and assess defenses on a network.
8
Min read
Threat Protection
Executive phishing, aka whaling, is a sophisticated form of spear-phishing that targets high-ranking company executives. Find out how to spot and protect your business from whaling attacks.
16
Supply chain attacks can have a devastating impact on a company - and even the economy. In this article, we’ll discuss supply chain attacks and how to prevent them.
Learn about spear-phishing, a dangerous form of phishing that targets a selected individual to steal their access credentials or other sensitive information.
This article explains why cybersecurity is important for small businesses, what the threats are, and how to counter them.
7
Brute force attacks are simple and inexpensive attacks that use trial and error to guess login credentials, encryption keys, or session IDs.
The Threat Blocker log boosts your situational awareness by keeping track of threat activity and policy violations in your IT infrastructure.
2
Learn how to enhance GoodAccess’ built-in domain-level protection from malware and phishing by adding your own blocklists and importing custom DNS records.
3
Phishing scams remain one of the most widespread tactics attackers use against companies. Learn the 6 best practices businesses need to adopt to stay safe.
12