While consumers benefit from big price drops and sellers see skyrocketing profits, Cyber Monday isn’t all sunshine and rainbows. It’s a fantastic opportunity for cybercriminals to roll out phishing scams too. …Continue Reading: 3 reasons why cybercriminals love Cyber Monday
email security
Click or Treat? How not to fall for phishing emails this Halloween
This week we’ve written a guest post for VMBlog, focusing on how not to fall for phishing emails this Halloween. …Continue Reading: Click or Treat? How not to fall for phishing emails this Halloween
100 Days of BIMI: Who’s showing their registered logo on emails?
Email marketers rejoice! Today officially marks 100 days of general availability of BIMI (Brand Indicators for Message Identification) with VMC, the email standard that lets businesses show their registered logos on DMARC authenticated emails…Continue Reading: 100 Days of BIMI: Who’s showing their registered logo on emails?
19 DMARC myths debunked by the experts
We live in an age of innovation, but also misinformation, and there’s a real danger of myths and falsehoods sabotaging our ability to utilize technologies for the better. In this blog, Brian Westnedge debunks 19 myths surrounding DMARC…Continue Reading: 19 DMARC myths debunked by the experts
Mastering the Art of Email Deliverability, by Yanna-Torry Aspraki
This week’s blog comes from Yanna-Torry Aspraki, Business Development & Deliverability Specialist at EmailConsul. In this blog, she gives expert insight into the world of email deliverability and covers the ins and outs of how you can improve yours…Continue Reading: Mastering the Art of Email Deliverability, by Yanna-Torry Aspraki
Introducing the Hierarchy of Business Email Security Needs
There’s a whole range of email security practices, products, and protocols out there, and it can be difficult to know exactly what’s needed for your business’ email security posture. So, we’ve put together this hierarchy highlighting what measures are essential, what’s extended, and what’s advanced. …Continue Reading: Introducing the Hierarchy of Business Email Security Needs