What are cryptocurrencies?Cryptocurrencies move over decentralized networks, with each computer...
GreatHorn Blogs
Featured
read more
Most Popular
More Blogs
Security Notification or Phishing Scam? How Cybercriminals Trick the Security Savvy
Phishing campaigns come in a wide variety of flavors – from volumetric voicemail scams to clever...
Phishing emails, explained: Attack Vectors targeting School Districts
Despite many attempts to heighten email security through user training sessions and simulated...
Phishing emails, explained: “New Voicemail Message” Attack Vector
In GreatHorn’s blog series, “Phishing Emails, Explained,” we take a closer look at real-world...
Why API based Cloud Email Security is Better than the SEG Approach
The term “cloud-native” gets thrown around a lot, but in email security there are very few...
Phishing Emails, Explained: “Action Required: Mail Sync Error!”
This is the first post in our new blog series, "Phishing Emails, Explained." In this series, we'll...
Top 10 Considerations for Evaluating Cloud Email Security Solutions
Choosing a new security vendor can be difficult. To help you with your assessment, we've compiled...