Research & Studies

How Americans Use Emojis in Work Emails

An emoji doesn’t usually say a thousand words, but it can help convey an idea or encapsulate your feelings in a limited space. And emojis can create a sense of complicity or togetherness, as the spike in emoji use at the start of lockdown illustrated. These are all precious commodities in business. But the lockdown

Continue Reading →

Research & Studies

Email Breach Report 2024

An email breach occurs when a company’s data is hacked or stolen with malware, exposing the email addresses of the company’s customers. If you have trouble logging into your email or notice unusual activity in your account, your address may have been compromised in this way. A number of services, such as Norton and Have

Continue Reading →

Research & Studies

The Most Loved Email, Messaging and Social Media Apps by Country

Humans have been communicating with one another just fine for a long, long time. So when new technology comes along to update the way we communicate, it needs to be frictionless, affordable and appealing to become ‘normal.’  Over the past three decades, some tech brands have become more adept than others at identifying and/or creating

Continue Reading →

Research & Studies

The Brands and Industries that Phishing Scammers Impersonate the Most

The first phishing incident took place in 1994, when a Pennsylvania teenager sent bogus messages asking AOL customers to verify their accounts, revealing their password to the scammer. Thirty years later, many of the thousands of phishing emails sent each day rely on the same underlying technology: trust in a well-known brand name. For our

Continue Reading →

Research & Studies

The Most Dangerous Pop Culture Passwords in 2024

In a world where over 2,200 cyberattacks are made per day, passwords are an internet user’s baseline defense against digital ne’er-do-wells. But when the average person has to remember 168 of them for their myriad online accounts, it’s easy to see how password fatigue can set in. Unfortunately, hackers are all too aware of humanity’s

Continue Reading →