Common security threats – Phishing

What is phishing: Any attempt to compromise a system and steal information by tricking a user into responding to a malicious message. The most common phishing attacks involve emails armed with malware hidden in attachments or links to infected websites. However, phishing can be conducted via other methods such as…

Continue Reading

Common security threats – Zero-Day Attack

The first key to any effective security game plan is knowing what you’re up against. We decided to share some of our knowledge and create for you a set of short, informative but simple blogs where you’ll learn all about ten of the most common threats your company is likely…

Continue Reading

From eWorker to Office Warrior

With work locations in Canada, the US, Europe and Dubai, the iRangers team is spread around the world. Some of the iRangers work in our offices, while others connect remotely. Dima Razbornov has been working as part of the team remotely for 4 years and this spring he joined the…

Continue Reading

Microsoft Intune – helps you simplify IT delivery

With thousands of organizations taking their infrastructure to the Microsoft Cloud platform today, we at iRangers are observing a common pattern they are struggling with. We notice that often organizations are not aware of all the benefits and possibilities that come with the integration of Microsoft Cloud. One of these…

Continue Reading

Microsoft Enterprise Mobility + Security

The realities of the modern workplace are very different from what they used to be just a few years ago. Do you miss the good old days, when you only had to remember one password to login into your computer and everything you needed was right there? Well, most likely…

Continue Reading

SENDAS PERMISSIONS ON MOBILE

Struggling with granting SendAs permissions on user’s cellphones? Just use our lifehack to set it up! Not so long ago, Misha Hanin wrote about the most convenient way to tackle multiple email addresses on your desktop. Now, we want to help you solve the challenge of setting up Receive As / Send…

Continue Reading

The story of one phishing email

Recently, our office got an email from somebody who claimed to represent a “Seitz Law Firm” in Miami. See the email below: Well, from the first sight, this email looks “Ok,” however, we’ve never had any communication or business with this company. Then, when you notice the email it was sent…

Continue Reading