Phishing SMB’s Supply Line

Phishing SMB’s Supply Line

To this day the most common way for businesses to order stock is through email. A purchasing officer or executive emails the company representative and sets up the order. In many ways this is superior to ordering through a portal. When the customer emails the rep, it...
Those Who Dare, Win

Those Who Dare, Win

Good Things To Those That Earn Them People who blend in don’t get rewarded. It is the people who stand out, who take risks that get the rewards. But this can be difficult. Companies in equilibrium don’t like change. Yet change is how they progress. Staying...

How Much Email Debt Do You Have?

Caught In A Wave… Threatening To Pull You Under Email is tricky because it revolves around social graces. You are not interacting with a machine. You are interacting with a emotional human. Turns out saying “it’s just business” helps about as...
Why We Don’t have Data

Why We Don’t have Data

Humiliating a company obsessed with not being humiliated Companies lie, protect and hide information about breaches with every fiber in their being. It’s just not something we have access to. That doesn’t mean we are wrong Hitchen’s razor is...
Inbox Zero Email Security

Inbox Zero Email Security

Complexity Is The Hackers Friend One of the most powerful ways to upset hackers, is to keep things simple. Rob Joyce the former head of NSA’s Tailored Access Operations has a very powerful saying. Attributing the NSA’s hacking prowess to the fact that they...

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!