Find out what’s new in Endpoint Protector v5.8

Find out what’s new in Endpoint Protector v5.8

v5.8 of Endpoint Protector by CoSoSys is now available and adds a host of new features to help organizations better protect their sensitive data from insider threats, accidental loss, and compliance breaches. Proxy settings during installation Streamline the...
Conversation hijacking and how to deal with it

Conversation hijacking and how to deal with it

Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations. Targeted e-mail attacks aren’t limited to spear phishing and business e-mail compromise (BEC). Another serious threat is conversation...