The Pepea Blog

You Can Trust Us To Do The Work For You...

Methods of phishing attacks and what to do in case you fall for it
Methods of phishing attacks and what to do in case you fall for it
From our previous article on what you need to know about phishing attacks, we know that phishing is the fraudulent act of acquiring private and sensitive information, such as credit ...
What you need to know about Phishing attacks
What you need to know about Phishing attacks
If you are a movie fan, you have seen scenarios where a character’s close companion is cloned by devious counterparts. The close companion and his/her clone then present themselves before ...
The Watchers on the Wall
The Watchers on the Wall
A Game of Thrones analogy describes the purpose of our award-winning Email Security service, Pepea Antispam/antivirus filtering. In case you missed the past 7 years of the HBO series, the Wall is a 482 ...
The Menace of Spambots
The Menace of Spambots
What are they? Technically speaking, bots are automated programs designed to perform a specific task, like connect you with a customer service agent. There are bad ones, good ones, and ...
Why Choose Message Labs Africa to Secure Your Data
Why Choose Message Labs Africa to Secure Your Data
Message Labs Africa has been in business for more than 10 years, with a sole vision of providing reliable and cost-effective cloud-based solutions to the growing African. Particularly , now ...
Ransomware Prevention Tips
Ransomware Prevention Tips
Ransomware is a type of a malware that denies a person ( computer user ) from accessing the computer or certain files by locking the system or by encrypting data ...
Could you be vulnerable to a phishing attack? -The Phishing threat & how organizations can protect themselves.
Could you be vulnerable to a phishing attack? -The Phishing threat & how organizations can protect themselves.
Over the years phishing attacks have become more and more common. Typically they’ve been targeted at individuals and smaller companies but there has been a rise in the number of ...
Online Thieves – Phishing Scam
Online Thieves – Phishing Scam
To many who do not realize what a phishing scam is, phishing is the attempt of acquiring sensitive information such as usernames, passwords, credit card/bank details or sometimes acquiring money ...
Business Email Compromise (BEC) and How to Protect yourself
Business Email Compromise (BEC) and How to Protect yourself
A cousin to ransomware in a sense Business Email Compromise (BEC) also known as “whaling’ or “CEO fraud, attacks in the form of impostor emails targeted at medium to large ...