Posts by Erica Mixon
About the Author
Erica is an award-winning writer, editor and journalist with over ten years of experience in the digital publishing industry. She holds a Bachelor’s degree in writing, literature and publishing from Emerson College. Her foray into technology began at TechTarget, where she provided editorial coverage on a wide variety of IT topics, from virtual desktops and Windows to data center infrastructure. In 2020, the American Society of Business Publication Editors (ASBPE) recognized her work for covering Citrix Synergy, an annual user conference. In 2021, ASBPE awarded her the Young Leader Scholarship, which recognizes up-and-coming leaders under 30 in the B2B industry. At Blumira, she covers topics such as ransomware, Windows security, and zero-day vulnerabilities.

Understand Microsoft 365 Impossible Travel Rules
Read More
Top 5 Office 365 Security Issues
Read More
9 Free Cybersecurity Tools for SMBs
Read More
Defending Against Common Microsoft 365 Attacks
Read More
The Return of IcedID and How to Detect It
Read More
Cybersecurity Vendors With Free Editions That Provide Real Value
Read More
Blumira Earns 30 G2 Badges, Including Best Support and Most Implementable
Read More
Analyzing MITRE’s Top Observed Attacker Techniques
Read More
Blumira Wins Globee® Cyber Security Global Excellence Awards for Startup of the Year and Chief Technology Officer of the Year
Read More
Defend Against Russian-Sponsored Cyberattacks
Read More
Top 5 Cybersecurity NFR Licenses For MSPs
Read More
Detecting Finishing Moves Before It’s Game Over
Read More
Cover Your Assets: Performing a Successful Security Inventory
Read More
Detecting DNS Tunneling: The Light At The End
Read More
Email Forwarding Security Risk (And How to Detect)
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.