![](https://static.wixstatic.com/media/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.webp)
![The Dangers Lurking When Employees Use Work Email Addresses for Personal Use](https://static.wixstatic.com/media/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.jpg/v1/fill/w_322,h_242,fp_0.50_0.50,q_90,enc_auto/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.webp)
The Dangers Lurking When Employees Use Work Email Addresses for Personal Use
Many companies likely have had their email credentials compromised without realizing it. In September 2016, researchers revealed that...
![](https://static.wixstatic.com/media/e2cab7_d74eadc21fbf4787a87ec14a2df41629~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e2cab7_d74eadc21fbf4787a87ec14a2df41629~mv2.webp)
![9 Signs That an Email Might Be a Phishing Scam](https://static.wixstatic.com/media/e2cab7_d74eadc21fbf4787a87ec14a2df41629~mv2.jpg/v1/fill/w_322,h_242,fp_0.50_0.50,q_90,enc_auto/e2cab7_d74eadc21fbf4787a87ec14a2df41629~mv2.webp)
9 Signs That an Email Might Be a Phishing Scam
Phishing attacks are still a weapon of choice for cybercriminals. The most common way they carry out phishing attacks is through email...
![](https://static.wixstatic.com/media/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.webp)
![Warn Your Staff about This Malicious Email](https://static.wixstatic.com/media/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.jpg/v1/fill/w_322,h_242,fp_0.50_0.50,q_90,enc_auto/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.webp)
Warn Your Staff about This Malicious Email
Be on guard — a fake security email is making the rounds. Disguised as an email from Microsoft, this phishing email is deceiving people...
![](https://static.wixstatic.com/media/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.webp)
![Cybercriminals Now Using Legitimate PayPal Emails in Scam](https://static.wixstatic.com/media/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.jpg/v1/fill/w_322,h_242,fp_0.50_0.50,q_90,enc_auto/e2cab7_a3afe730ae7f4046bbab78e07d2b5400.webp)
Cybercriminals Now Using Legitimate PayPal Emails in Scam
PayPal scams are nothing new. What is new is that cybercriminals have started using legitimate PayPal services to perpetrate those...
![](https://static.wixstatic.com/media/e2cab7_534633566b5c416281507e1a7a67dfd5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e2cab7_534633566b5c416281507e1a7a67dfd5~mv2.webp)
![Devious Tricks That Cybercriminals Use to Scam Businesses](https://static.wixstatic.com/media/e2cab7_534633566b5c416281507e1a7a67dfd5~mv2.jpg/v1/fill/w_322,h_242,fp_0.50_0.50,q_90,enc_auto/e2cab7_534633566b5c416281507e1a7a67dfd5~mv2.webp)
Devious Tricks That Cybercriminals Use to Scam Businesses
Cybercriminals have stolen $3.1 billion from businesses since January 2015 — not with high-tech ransomware or stealthy spyware, but...