top of page



A guide for the MSP help desk: 5 actions to take following a suspected phishing attack
Discover 5 essential actions for your MSP help desk to take following a suspected phishing attack.


A guide for end-users: 5 steps for reporting a successful phishing attack
Learn how to report a successful phishing attack with this comprehensive guide for end-users.


10 reasons your MSP needs a phishing incident response plan
Discover the top 10 reasons why your MSP needs a phishing incident response plan. Protect your clients, enhance trust, and stay compliant!


Whitelisting in Proofpoint
Learn how to whitelist HacWare in Proofpoint Essentials and ensure safe delivery of emails.


HacWare Partner Portal: Your Human Risk Management Dashboard
Within the Partner Portal, each of your tenant accounts features a comprehensive Human Risk Management Dashboard.


How to use the Policy Management tools
New policy management capabilities let you manage cybersecurity policies for your tenants within the Partner Portal.


HacWare partners with IT By Design
ITBD and HacWare announced a marketplace partnership that will allow MSPs to easily access top tools and solutions from premier vendors


Understanding the risks of public wifi
Users understanding the risks and best practices when using public wifi networks is crucial to your client’s overall cyber hygiene.


Who gets notified about a phish?
Walk through how to set up email notification contacts for each tenant so the right people are getting the right information.


Spear phishing: how hackers use personal information to target users
Spear phishing is a type of phishing message that’s highly targeted and personalized and is usually harder to detect than mass-phishing.


Partner Success Stories with Dan Le, Red Cup IT | Webinar
In this Partner Success Stories webinar with Dan Le, CEO of Red Cup IT, Dan and Juan discuss growth tactics & compliance for MSPs.


3 easy ways to set up end-to-end encryption (E2EE) communication for your customers
If your SMB clients communicate using messaging apps, they may be creating a vulnerability by unencrypted messages.
bottom of page