Blog

Image of a sim card

SIM-swap fraud: Scam prevention guide 

SIM-swapping is quickly becoming a favorite form of attack for cybercriminals. According to the National Fraud Database, SIM-swap fraud jumped by over 1,000% in 2024. Hackers port a victim’s number onto a rogue SIM, so they can intercept SMS-based... Read More

Specops Software - an Outpost24 company logo

Introducing Specops Service Desk for Cloud (Entra ID) 

The service desk has become a prime target for sophisticated social‐engineering campaigns. It’s never been more important to arm frontline support teams with the tools they need to verify every caller from a potential liability into a confirmed identity.... Read More

Image of a padlock on a computer keyboard

Password encryption: What is it and how does it work?

As companies rapidly shift towards cloud-based environments, employees find themselves juggling multiple accounts across a variety of platforms, each one most likely safeguarded by a password. These digital keys are often the first (and sometimes only) line of defense... Read More

Image of login page

Credential harvesting: How it works & tips for prevention

Credential harvesting represents a serious threat to organizations of all kinds – particularly in today’s digital landscape, where virtually every enterprise depends on user credentials for access and security.   According to IBM’s 2025 Threat Intelligence Index, nearly a third... Read More

Grey dragon head on door

DragonForce: Inside the Ransomware-as-a-Service group

​The popularity of Software-as-a-Service (SaaS) has exploded over the past decade. The benefits for organizations are obvious – SaaS is scalable, cost-effective, and doesn’t need complex installation or maintenance. Gartner expects global spending on SaaS to reach $3 billion... Read More