Inside the Ink

April 15, 2025

Why Enhanced User Security Is Essential in a Hybrid, SaaS-Driven World

SaaS apps & hybrid work have expanded the attack surface. Users are now the frontline of defense. Learn why proactive protection is a must-have.

Read More
April 09, 2025

The Week in Breach News: 04/02/25 – 04/08/25  

A $1.5 million BEC loss in Baltimore, MD, hackers hit Australian pension funds & building a cyber-resilient workforce.

Read More
April 08, 2025

Building a Cyber-Aware Workforce: Best Practices for Employee Training

Learn best practices to help you build a cyber-aware workforce that can act as your organization’s first defense against cyber trouble.

Read More
April 02, 2025

The Week in Breach News: 03/25/25 – 04/01/25  

Oracle’s cloud breach hits 1.5k victims, cyberattacks lead to train trouble in Ukraine & Russia + reducing BEC risk through user protection.

Read More
April 01, 2025

Stopping BEC Starts with User Protection

Learn how investing in user protection helps you protect your organization from costly BEC scams before they start.

Read More
March 26, 2025

Business Continuity in the Face of Ransomware

Learn how Spanning Backup and Datto SaaS Protection — critical components of Kaseya 365 User —protect your SaaS data against ransomware.

Read More

The Week in Breach News: 03/19/25 – 03/25/25 

A Zero-Day exposes bank data, hackers steal zoo research data, big trouble for a New Zealand retailer & building cyber resilience

Read More
March 24, 2025

5 Proven Ways to Strengthen Cyber Resilience by Safeguarding Users

Today’s sophisticated cyberthreats require a smarter defense. These 5 actionable tips can help you strengthen a company’s cyber resilience.

Read More
March 19, 2025

The Week in Breach News: 03/12/25 – 03/18/25

A hit with the first AI-created ransomware strain, an attack leaves a Canadian chocolatier with a bitter taste & guarding your human firewall

Read More
March 18, 2025

The Human Firewall: Strengthening Your Organization’s Most Vulnerable Gateway 

Discover the benefits of choosing a three-pronged comprehensive user risk management approach that addresses the problem holistically.

Read More

Please fill in the form below to subscribe to our blog