MDaemon Technologies Blog

Got Employees Working From Home? How to Tighten Up Your Cyber Security

By Brad Wyro posted in Business Email Compromise, Data Leak Prevention, Email Privacy, Email Management, Phishing, Email Server

0 Comments

 

It’s OK, we understand. You thought you and your employees would all be safely back in the office by now. However, we’re all still adjusting to this new normal of exponentially more remote working – and exponentially more cyberattacks. Every day, hackers seek to exploit not only fear and insecurity caused by the pandemic, but the security loopholes created as more employees access their email and other work systems from remote devices. According to one report, streaming phishing sites saw an 85-percent increase from January to March, with more than 209 malicious websites being created every day. A record 25,000 confirmed phishing pages were created on March 19 alone!

Read More

Don't Become a Victim of Common Email Scams in Healthcare

By Brad Wyro posted in Business Email Compromise, Email Security, Cybersecurity, Stop Spam Email, Phishing, Health Care Security

0 Comments

 

It's just a fact of life: If there's email, there will always be spam. If you’re involved with email security for a healthcare organization, 2020 is absolutely the year you can’t afford not to take this seriously. The healthcare sector has become a major target for cyberattacks during the COVID-19 pandemic, and these attacks are successful so often that Becker’s Hospital Review publishes a monthly update on healthcare provider malware, ransomware and phishing incidents. The most recent list includes:

Read More

Security Gateway’s Built-in Archiving & Email Integration For Healthcare

By Brad Wyro posted in Product Updates, Email Archiving, Health Care Security

0 Comments

 

When it comes to email archiving, healthcare organizations require capabilities that continuously meet stringent healthcare-related regulations including HIPAA, privacy regulations such as CCPA, and financial protections such as PCI DSS compliance. This is even more critical in 2020, when the health sector leads all industries in annual data breach costs – with a global average of $7.13 million! – due to federal and state regulations. 

Read More

10 Tips to Help Healthcare Employees Identify a Phishing Email

By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Health Care Security

0 Comments

 

Whether you run a multi-campus medical center or a small private practice, you’ve likely heard about cyber criminals who try to trick you and your employees into clicking a link or downloading an attachment so they can steal your organization’s money or protected data.

Read More

Microsoft 365 Vulnerabilities Your Healthcare Business Should Consider

By Brad Wyro posted in Email Gateway How-To, Email Security, Stop Spam Email, Phishing, Two-Factor Authentication, Health Care Security, Email Best Practices

0 Comments

The COVID-19 pandemic has accelerated the adoption of cloud services across all industries, but particularly for healthcare providers. If your healthcare organization is considering moving your email from on-premise servers to the cloud, you must do your due diligence around significant security drawbacks that may overshadow the perceived benefits.

Read More

Phishing Email Targets Healthcare to Get Past Microsoft Security

By Brad Wyro posted in Email Gateway How-To, Email Security, Stop Spam Email, Phishing, Two-Factor Authentication, Health Care Security, Email Best Practices

0 Comments

 

The COVID-19 pandemic has been a boon for bad actors across the digital landscape. In July, for instance, authorities in the U.S., U.K. and Canada all issued warnings about serious cyberattacks against healthcare organizations and others involved in the coronavirus response. The purpose of these attacks? Theft of intellectual property during the race to develop a vaccine. The tool of choice? Spear-phishing email attacks.

Read More

Business Email Compromise Scams are Reminder to Educate Users

By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Email Spoofing, Phishing, Health Care Security

0 Comments

Online scams are nothing new -- but as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.

Read More

Best Practices to Protect Email for Healthcare Organizations

By Brad Wyro posted in Email Gateway How-To, Email Privacy, Health Care Security

0 Comments

As long as healthcare organizations continue to use email, cybercriminals will find new ways to exploit security gaps, software bugs, and basic human nature to extort millions of dollars from their victims. In just the first six months of this year, Becker’s Hospital Review has noted more than 65 separate incidents of malware, ransomware and phishing attacks on healthcare providers, ranging from Alaska and Hawaii to Florida and Maine. These attacks affected more than 1.14 million patient records in just the cases that released statistics; the true number of those affected is much higher. While one-third of these attacks are specifically noted as being email-related, again, the true number is likely much higher.

Read More

How to Secure Your Business Email as Healthcare Employees Work from Home

By Brad Wyro posted in Email Gateway How-To, Email Encryption, Email Management, Security Gateway for Email, Health Care Security

0 Comments

The COVID-19 crisis has changed the way we approach data privacy and email security. The necessary and accelerated transition to working from home has been accompanied by a growing surge of Coronavirus-themed phishing scams and spoofed websites used to distribute malware or lure victims into providing confidential information.

 

Read More

Business Email Compromise - The 26 Billion Dollar Threat to Your Business

By Brad Wyro posted in Email Security

0 Comments

Email is the preferred communication method for businesses around the world. It’s also the preferred attack vector for cybercriminals due to its ease of use and low cost, and since the beginning days of email, spam techniques have continued to evolve into a variety of sophisticated threats.

 

BEC_2019_Stats (1)

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates