Google updates include added phishing protection and better defence against malware injection attempts. We’ve written this blog to help you assess the options available to you and help you make the most of them…Continue Reading: How to make the most of Google’s new anti-phishing and malware capabilities
Identity Theft: How attackers get hold of your details
Ever wondered how someone got hold of your details? As per recent headlines, it turns out it’s easier than you think… If you haven’t seen the film Identity Thief, spoiler alert! It’s a perfect rainy day movie and stars the ever hilarious Melissa McCarthy in the brilliant but ridiculous story of a guy who gets his…Continue Reading: Identity Theft: How attackers get hold of your details
How can you shine a light on shadow IT?
If you have nothing to do with managing IT systems in your business, you probably won’t even have heard of shadow IT. But it’s keeping your IT teams up at night, and it’s probably not doing your business any favors either…Continue Reading: How can you shine a light on shadow IT?
Top 5 Email Deliverability Killers
Email deliverability is the core of every digital marketer’s email strategy, and we’ve identified the 5 biggest issues that cause your email deliverability to suffer…Continue Reading: Top 5 Email Deliverability Killers
6 Free email tools to make your life easier
In this post, we share some of the Red Sift team’s favourite email tools in the hope they might help you too…Continue Reading: 6 Free email tools to make your life easier
5 common cybersecurity mistakes to avoid
Sometimes it’s the little things that make the biggest difference. These might seem like obvious pitfalls to swerve, but it’s scary how frequently we hear about some disaster following a really basic cybersecurity error…Continue Reading: 5 common cybersecurity mistakes to avoid