Resource Center
Tolly Group Comparative Study: Microsoft Defender for Office 365 vs GreatHorn
[On-Demand Panel Discussion] Building and Managing an Effective Incident Response Process
[On-Demand] Anatomy of Sophisticated BEC Attacks: Beyond Simple CEO Impersonation
Security Weekly Podcast: Massive Cyberattack Spreading Across 68% of Organizations
Security and Compliance Weekly Podcast A current and active cyberattack is spreading rapidly...
2020 End User Phishing Report
[On-Demand] Developing an Offensive and Defensive Email Security Strategy
Phuck Phish Podcast: Episode 1
Typosquatting Ahead of US Elections; Email-based Malware Campaigns September 29, 2020: 32 minutes...
[Infographic] Impact of Phishing Attacks on Organizations and How to be Prepared
This infographic covers the impact phishing attacks can have on organizations and offers some tips...
![[On-Demand] Cyber-Attacks in the Wake of a Pandemic: Trends to Prepare For in 2021](https://www.greathorn.com/wp-content/uploads/2020/12/cyber-attacks-in-the-wake-of-a-pandemic-feature2-400x250.jpg)

![[On-Demand Panel Discussion] Building and Managing an Effective Incident Response Process](https://www.greathorn.com/wp-content/uploads/2020/11/building-and-managing-an-effective-incident-response-feature-400x250.jpg)
![[On-Demand] Anatomy of Sophisticated BEC Attacks: Beyond Simple CEO Impersonation](https://www.greathorn.com/wp-content/uploads/2020/11/anatomy-of-sophisticated-business-email-compromise-social-share2-400x250.jpg)


![[On-Demand] Developing an Offensive and Defensive Email Security Strategy](https://www.greathorn.com/wp-content/uploads/2020/10/developing-an-offensive-defensive-email-security-strategy-social-share-400x250.jpg)

![[Infographic] Impact of Phishing Attacks on Organizations and How to be Prepared](https://www.greathorn.com/wp-content/uploads/2020/09/greathorn-impact-of-phishing-attacks-on-organizations-and-how-to-be-prepared-feature-400x250.jpg)
![Facts vs Deception: Today’s Phishing Attack Landscape [ON DEMAND]](https://www.greathorn.com/wp-content/uploads/2020/09/facts-vs-deception-webinar-ondemand-graphic2-400x250.jpg)
![[Whitepaper] Email Security Cubed: A Layered Approach to Reducing Cyber-Risk](https://www.greathorn.com/wp-content/uploads/2020/09/greathorn-email-security-cubed-a-layered-approach-feature-400x250.jpg)
![[Whitepaper] Dynamic Email Monitoring: Achieving Balance to Optimize Both Security and Productivity](https://www.greathorn.com/wp-content/uploads/2020/09/greathorn-dynamic-email-monitoring-feature-400x250.jpg)