top of page
Phishing Incident Response Plan: Recovery stage
Discover the crucial steps to take during the recovery stage of a phishing incident through remediation and prevention.
Phishing Incident Response Plan: Communication stage
Learn how to effectively communicate during the communication stage of a phishing incident response plan.
Phishing Incident Response Plan: Remediation stage
As a part of your Phishing Incident Response plan, the remediation stage is vital.
A guide for the MSP help desk: 5 actions to take following a suspected phishing attack
Discover 5 essential actions for your MSP help desk to take following a suspected phishing attack.
A guide for end-users: 5 steps for reporting a successful phishing attack
Learn how to report a successful phishing attack with this comprehensive guide for end-users.
10 reasons your MSP needs a phishing incident response plan
Discover the top 10 reasons why your MSP needs a phishing incident response plan. Protect your clients, enhance trust, and stay compliant!
Whitelisting in Proofpoint
Learn how to whitelist HacWare in Proofpoint Essentials and ensure safe delivery of emails.
HacWare Partner Portal: Your Human Risk Management Dashboard
Within the Partner Portal, each of your tenant accounts features a comprehensive Human Risk Management Dashboard.
How to use the Policy Management tools
New policy management capabilities let you manage cybersecurity policies for your tenants within the Partner Portal.
HacWare partners with IT By Design
ITBD and HacWare announced a marketplace partnership that will allow MSPs to easily access top tools and solutions from premier vendors
Understanding the risks of public wifi
Users understanding the risks and best practices when using public wifi networks is crucial to your client’s overall cyber hygiene.
Who gets notified about a phish?
Walk through how to set up email notification contacts for each tenant so the right people are getting the right information.
bottom of page