Blog

Phishing Reporter information security, cyber security, data breach, security awareness, social engineering, anti phishing solutions, free phishing training

Keepnet Labs outlook add-in setup

Keepnet Labs Outlook plugin is available in two versions, 32 bit and 64 bit. Both versions support unattended installation. It is compatible with below version of Outlook Application Version Support Microsoft Windows Compatible Outlook 2010 Compatible Outlook 2013 Compatible Outlook 2016 Compatible Microsoft Exchange & OWA Compatible Microsoft Outlook on iPhone Compatible Microsoft Outlook on Android Compatible Microsoft Outlook on Mac Compatible Google G-suit Compatible iPhone Mail Client Compatible To run phishing reporter add-in, [...]

Read more...
Phishing Reporter information security, cyber security, data breach, security awareness, social engineering, anti phishing solutions, free phishing training

Suspicious email reporter and analysis tool

Does your employees aware what to do when they get a suspicious email? Are they heading to the helpdesk or IT specialist? Or do they directly delete this email?  Keepnet Labs Outlook Add-in ( Keepnet labs phishing reporter)  provides an easy and reliable solution to this situation. How do SOC (1) [...]

Read more...
anti phishing tools

Anti phishing solutions: anyone can be a victim of phishing attack

This year in March, a Lithuanian cybercriminal was arrested for alleged phishing attack targeting two US-based technology companies. (*) It was stated that this person named Evaldas Rimasauskas , appearing as representatives of an Asian company, sent phishing e-mails to the representatives of the two major technology companies whose [...]

Read more...

Email services and their security issues

Without a doubt, emails have become one of the most important tools on the internet today, where they are being used in the formal/informal daily communications. The practicality of email also raised concerns about email security, because we see it in every part of our life. Email, which stands for ‘Electronic [...]

Read more...
Cyber Safety Rules

Cyber safety rules

The problem is not technology; How technology is used. phishing training It can cause concern for how young people use internet-connected devices. For example, smart devices have cameras that are used to uncover and promote creativity, and some applications may have video chat or functions that allow live streaming. They [...]

Read more...
information security, cyber security, data breach, security awareness, social engineering, anti phishing solutions

Privacy important for your business

Protect personal data Personal information is important both for your organization and for your customers. You must implement the following actions in your own institution to create a cult of respect for privacy, protection and safety. Protect personal data. Take reasonable security precautions to protect the personal information of individuals against improper [...]

Read more...
Anti phishing solution

Privacy in wireless networks

anti phishing solution Privacy in Wireless Networks For many internet users, it is useful to use libraries and public computers in different places. The devices in these public places carry a great source of quality. However, when using these devices it is important to keep in mind the correct online security [...]

Read more...
Spring digital cleaning list

Spring digital cleaning list

Spring digital cleaning list Week 1. Clean Your All Devices Make Sure All Your Connected Devices Clean Update all the software on your connected devices to minimize the risks of malware and viruses. Clean your mobile devices by deleting apps you do not use, and viewing app permissions. Week 2. Make Sure You Are [...]

Read more...
phishing software, Ransomware

Avoid Ransomware Attacks

As technology develops, the frequency of ransomware and other phishing attacks increase against internet users and institutions. It is important that digital citizens be alerted to digital hygiene, which is a fundamental part of the global world, and get protected against ransomware and other phishing attacks increase. Use our phishing software to [...]

Read more...