Education Hub

Learn the patterns

Understanding how scams and phishing attacks work is your first line of defense. These guides cover the most common threats in plain language, with actionable checklists.

PhishingOctober 15, 2024·6 min read

How to spot a phishing email in 60 seconds

Modern phishing emails are indistinguishable from legitimate ones — even to IT professionals. Here is what actually separates them.

Read article →
ScamsOctober 22, 2024·7 min read

Red flags in payment requests and invoices

Fake executive email scams cost individuals and organizations $2.9 billion last year. The attacks are surgical, patient, and nearly impossible to detect without knowing what to look for.

Read article →
PhishingNovember 1, 2024·5 min read

QR code scams: what to check before scanning

QR codes bypass the most basic phishing defense you have — looking before you click. Attackers know this. Here is what they are doing with it.

Read article →
ScamsNovember 8, 2024·8 min read

Romance and impersonation scams: the pattern that steals everything

Romance scammers are not opportunists. They are patient, professional, and running scripts refined across thousands of victims. The warning signs are recognizable — if you know what to look for.

Read article →
FilesNovember 15, 2024·6 min read

Safe ways to open suspicious documents

A malicious PDF can compromise your device before you finish reading the first page. Here is how to examine files you are unsure about — without putting everything you have at risk.

Read article →
Incident ResponseNovember 22, 2024·5 min read

If you already clicked: what the next 15 minutes decide

Every second after clicking a malicious link narrows your options. This is the exact sequence that determines whether you contain the damage — or lose everything.

Read article →

Reading about threats is useful. When you encounter a real one, submit it for advisory review and get a specific recommendation based on your situation.