Please note: For privacy reasons the identity of the hacked account in the example used for this blog has been changed. In our previous email security education blog we reviewed trending email security threats. In this blog, we'd like to show you what a phishing campaign looks like, and itsRead More >