This week, we continue our series on Business Email Compromise. Click here to read Part 1, which includes an overview and various statistics on this growing threat.
Brad Wyro
Recent Posts
Four-Step Swindle: The Anatomy of a Business Email Compromise Attack
By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Phishing, Email Security Trends
Before the invention of email, mail that arrived in your physical mailbox often contained pamphlets, sales brochures, credit card offers, and product catalogs. Much of this waste was thrown away and ended up in a landfill somewhere. Today, the equivalent and often more annoying nuisance is spam. Spam comes in many forms, and has evolved from dubious product claims, miracle supplements, conspiracy theories, and offers of easy money to more malicious threats such as ransomware attacks and targeted spear-phishing.
Encrypting vs. Signing with OpenPGP. What’s the Difference?
By Brad Wyro posted in Email Gateway How-To, Email How To, Email Security, Email Encryption
Many businesses are responsible for maintaining large amounts of confidential data, including customer records, medical records, financial reports, legal documents, and much more. It’s very common for these types of information to be transmitted via email, especially as the Covid-19 pandemic has forced many businesses to embrace working from home. So how can you ensure confidential data transmitted via email is kept private? How can you ensure the integrity of transmitted data?
Alt-N Technologies is Renamed MDaemon Technologies
By Brad Wyro posted in MDaemon Email Server, Security Gateway for Email, Email Server, Email Security Trends
New Name to Leverage Global Brand Equity of Company’s Flagship Email Server
Grapevine, TX (USA) – January 2, 2018 – Alt-N Technologies announced today that, effective immediately, the Company’s legal name will be MDaemon Technologies, and that it will begin doing business under the new company name.
MDaemon's Dynamic Screening Blocks Hackers from Guessing Passwords
By Brad Wyro posted in Email Gateway How-To, Cybersecurity, MDaemon Email Server, Email Server
If you have an email account (and in 2017, you probably have more than one), you are a target. More specifically, your email password is a target and a coveted prize for hackers. And let’s face it – hackers are not going away anytime soon. Because the barriers to entry are so low and the potential payoffs so large, hackers are more motivated than ever to try to steal your login credentials. As an MDaemon administrator, you are tasked with making sure your users use strong passwords, but here are a few things to consider when evaluating your password & security policies:
Don’t Get Hit by the Whaler’s Harpoon
By Brad Wyro posted in Email Gateway How-To, Email How To, Email Privacy, Email Server
What is Whaling?
Steps to Track Spam Sent Out From a Local Machine on Your Network
By Brad Wyro posted in Email Gateway How-To, Email How To, Email Security, Cybersecurity, Stop Spam Email, Tutorial, Email Security Trends
Has this happened to you? Let’s say you’re the MDaemon administrator for your company, and you’ve noticed that somewhere, somehow, spam messages are being sent from within your network. Perhaps one of your PCs has been compromised. What do you do? Here are some tips to help you track the issue down.
How To Track Spam Being Sent Out From a Local Machine on your Network
By Brad Wyro posted in Stop Spam Email
Has this happened to you? Let’s say you’re the MDaemon administrator for your company, and you’ve noticed that somewhere, somehow, spam messages are being sent from within your network. Perhaps one of your PCs has been compromised. What do you do? Here are some tips to help you track the issue down.
Easy Backup & Recovery with MDaemon
By Brad Wyro posted in Email How To, Email Management, MDaemon Email Server, Email Server, Email Security Trends
MDaemon's user-friendly flat-file structure makes it easy to backup and recover your email messages, user accounts, security settings, and any other data stored in MDaemon. No extra Windows components or third-party applications are required, and you won't have to navigate through any confusing dialog boxes to backup & recover your data. Backing up and restoring MDaemon is as easy as drag & drop. All you would need to do is map a drive letter from the MDaemon server to another drive on your network, then drag over the files you want to back up.