Email Client
State of the Phish 2019 Report
What did the phishing landscape look like in 2018? Is general end-user awareness of phishing and other...
Stopping BEC and EAC
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require...
2022 State of the Threat: A Year in Review
In 2022, ransomware remained the most prevalent form of attack. In investigations by Secureworks® incident...
CompTIA A+ Certification All-in-One For Dummies, 5th Edition
Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification...
Reimagining Email Security
In the changing landscape, security and risk management leaders must ensure that existing security solutions...
Taking Control of Your Office 365 Data
Modern software-as-a-Service (SaaS) applications such as Microsoft Office 365 can offer several advantages...
Unmasking BEC and EAC
Whether they result in fraudulent wire transfers, misdirected payments, diverted payrolls, supply-chain...
CIO Essential Guidance: Intrinsic Security
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise....
Windows 10 for Dummies, 2nd Edition (Full eBook)
The most comprehensive guide to Windows 10, updated with the latest enhancements. This eBook includes...
Modern Blueprint to Insider Threat Management
Taking a People-Centric Approach to Your Insider Threat Management (ITM) Programme. Insider threats can...
The World is Your Workplace: Public Safety Mobile Solutions
Public safety personnel of all types rely on mobile technology to remain connected, efficient and informed....
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.