MDaemon Technologies Blog

Not Today, Scammer! Today's Phishing Attempt

By Brad Wyro posted in Email Security, Cybersecurity, Stop Spam Email, Phishing

0 Comments

A brief glance through my Spam folder in MDaemon Webmail today reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. Because businesses have already lost millions of dollars to these scams and continue to fall victim every day, it bears repeating that, while spam filters and secure email gateways continue to improve, no solution is 100% fool-proof.

Read More

Never Lose an Important Email: How to Track Messages in Security Gateway

By Brad Wyro posted in Email Gateway How-To, Email How To, Security Gateway for Email, Tutorial

0 Comments

Most of our customers are small-to-medium businesses with limited IT budgets across a variety of industries – including healthcare, education, manufacturing, and government. Having a limited IT budget often means having limited staff available for troubleshooting email or tracking down messages, so when considering which email gateway/spam filter you want for your business, one of the main criteria to consider is how easy it is to find messages for your users. Users who are expecting business-critical messages need to know ASAP what happened if that message is not delivered. With Security Gateway, it’s easy to find out if a message was rejected, quarantined or delivered. If it was rejected or quarantined, color-coded transcripts make it easy to determine exactly why the message was not delivered.

Read More

MDaemon 19 Provides Updates for Security, Reporting, & Webmail

By Brad Wyro posted in MDaemon Email Server, Product Updates, Email Server

0 Comments

 

This week, we released version 19 of the MDaemon Email Server, with new features that benefit administrators and end users. The following is a summary of key improvements for email security and productivity. You can view the complete list of new features and updates in the MDaemon release notes.

 

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Email Security Best Practices

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

 

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

MDaemon Technologies Announces New Email Security Gateway Services in the Cloud

By Brad Wyro posted in Product Updates, Security Gateway for Email

0 Comments

The latest version of Security Gateway for Email Servers includes new cloud services, expanded Data Leak Prevention rules and integrated archiving features to help companies affordably protect user email.

Read More

Another day, another attempt to scam me - but I know a phishing attempt when I see one!

By Brad Wyro posted in Business Email Compromise, Email Security, Cybersecurity, Stop Spam Email, Phishing

0 Comments

OhNo-I-clicked-2 (1)It's just a fact of life: If there's email, there will always be spam. Now, how much spam you have to deal with will depend on how good your spam filtering solution is. Here at MDaemon Technologies, we use our own products - MDaemon and Security Gateway, to filter out spam, malware, phishing attempts, and all of the other junk that often floods inboxes of users whose email server or hosted service isn't as effective.

Read More

Best Practices to Avoid Business Email Compromise & CEO Fraud Attacks

By Brad Wyro posted in Email Security, Two-Factor Authentication, Email Best Practices

0 Comments

 

In part one of our three-part series on Business Email Compromise (BEC), I explained what a BEC attack is and provided examples and statistics. As you’ll recall from the examples discussed, businesses have suffered staggering losses to these attacks, and while users are becoming more aware of them, their own human nature dictates that these threats will continue. In fact, a recent report by Get Safe Online indicated that over a third (37%) of employees don’t know what to look for to identify common email scams. The report also stated that one in 20 email fraud victims were so ashamed that they hid their mistakes from their colleagues.

Read More

Four-Step Swindle: The Anatomy of a Business Email Compromise Attack

By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Phishing, Email Security Trends

0 Comments

This week, we continue our series on Business Email Compromise. Click here to read Part 1, which includes an overview and various statistics on this growing threat.

Read More

10 Ways to Reduce Spam in Your Inbox

By Brad Wyro posted in Email Security, Stop Spam Email

0 Comments

 

Before the invention of email, mail that arrived in your physical mailbox often contained pamphlets, sales brochures, credit card offers, and product catalogs. Much of this waste was thrown away and ended up in a landfill somewhere. Today, the equivalent and often more annoying nuisance is spam. Spam comes in many forms, and has evolved from dubious product claims, miracle supplements, conspiracy theories, and offers of easy money to more malicious threats such as ransomware attacks and targeted spear-phishing.

Read More

Encrypting vs. Signing with OpenPGP. What’s the Difference?

By Brad Wyro posted in Email Gateway How-To, Email How To, Email Security, Email Encryption

18 Comments

 

Many businesses are responsible for maintaining large amounts of confidential data, including customer records, medical records, financial reports, legal documents, and much more. It’s very common for these types of information to be transmitted via email, especially as the Covid-19 pandemic has forced many businesses to embrace working from home. So how can you ensure confidential data transmitted via email is kept private? How can you ensure the integrity of transmitted data?

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates