You may have heard the terms SSL and TLS, but do you know what they are and how they’re different?
By Brad Wyro posted in Email Security, Email Encryption, Email Security Best Practices, Two-Factor Authentication, Email Security Trends, Email Best Practices
You may have heard the terms SSL and TLS, but do you know what they are and how they’re different?
By Brad Wyro posted in Email Gateway How-To, Email Security, Stop Spam Email
Ever wonder why so much spam exists today? Though spam volumes have decreased from a high of over 90% of global email traffic, it still makes up roughly a third of that traffic, and though the numbers of junk email messages are decreasing, their malware and ransomware payloads are evolving and becoming much more dangerous. Some of the most common types of spam messages include financial scams, phishing attempts, ransomware, and botnet malware. In this article, we focus primarily on botnets.
By Brad Wyro posted in Email Gateway How-To, Email How To, Email Security Best Practices, Two-Factor Authentication, Email Security Trends, Email Best Practices
By Brad Wyro posted in Security Gateway for Email, Stop Spam Email
SecurityGateway is a powerful email spam & malware filter & gateway that can be used to protect any type of mail server. It offers a layered approach to security, with protection features including data leak prevention, attachment filtering, heuristic and Bayesian analysis, zero-hour Outbreak Protection, and much more.
By Brad Wyro posted in Email How To, Email Security, Email Encryption, Cybersecurity, Health Care Security
Whether you work in health care, finance, government, or any other field that requires the storage of data, there's always someone out there who would love to gain access to your confidential records. Don't let the bad guys steal your data. Protect it with server-side encryption. Our latest release of MDaemon supports OpenPGP, which allows MDaemon to perform encryption, decryption, and key management tasks. Learn how to enable OpenPGP support in MDaemon, and how to send encrypted mail in our latest video.
As we discussed in an earlier post, messages that users may receive in response to messages they never actually sent (due to their email addressed having been forged in a spam message's return-path) are known as backscatter. In that post, we discussed what backscatter is and explained how to enable Backscatter Protection in MDaemon.
By Brad Wyro posted in Email Gateway How-To, Email How To, Email Security, Cybersecurity, MDaemon Email Server, Stop Spam Email, Email Server, Email Security Trends
By Brad Wyro posted in Email How To, Email Security Trends
Occasionally, our support staff will receive calls from end users who have forgotten their email password or are having issues logging into WorldClient. Users are then instructed to contact their mail server administrator for assistance. But what if users don't know who to contact for help, and don't know how to even find out who to contact? For some users, trying to track down the appropriate contact for help can lead to wasted time and lost productivity.
By Brad Wyro posted in Email How To, Email Security Trends
By Brad Wyro posted in Email How To, Email Security Trends
It is possible to create any number of schedules you wish. You can name each schedule and attach a schedule to a custom mail queue. You can also create as many custom mail queues as you want. Use the Content Filter to move messages into your custom queues based on any criteria you wish.
For example, you can create a schedule called 'Large Messages', create a queue to store those messages, and then create a Content Filter rule using the 'MOVE message to custom QUEUE' action to move messages over a certain size into that queue. If you'd like mailing list messages delivered at certain times then create a schedule called (for example) 'List Mail', create a queue, and then use a Content Filter rule to move messages with an X-MDMailing-List header into the new queue.
MDaemon Technologies is a pioneer in developing email and email security software helping to protect customers from evolving cyber-security threats. Its products and services are trusted by thousands of organizations in over 140 countries. For more than two decades, the company’s products have been developed with the ongoing input of IT professionals who demand reliable, affordable software that requires minimal effort to manage.
The software can be deployed in virtual, hosted cloud, on-premises, or hybrid network environments. The company sells its software and services directly and through a network of global channel partners.
For more information, visit www.mdaemon.com.
Copyright © 1996-2025 MDaemon Technologies. View privacy policy.