MDaemon Technologies Blog

How to Secure your Business Email as Employees Work from Home

By Brad Wyro posted in data leak prevention, DLP, Email Privacy, Email Security, pgp, security, privacy, Security Gateway, SecurityGateway, send later, spam, SSL, Webmail, best practices, compliance, Email Encryption, spam filter, two-factor authentication

0 Comments

The COVID-19 crisis has changed the way we approach data privacy and email security as the transition to working from home has been accompanied by a growing surge of Coronavirus themed phishing scams and spoofed websites used to distribute malware or lure victims into providing confidential information.

Read More

15 Best Practices for Protecting Your Email with Security Gateway

By Brad Wyro posted in Email Best Practices, Email Security, Security Gateway, SecurityGateway, best practices, email security

0 Comments

Despite the rumors announcing the death of email, its use continues to grow. According to research from the Radicati Group, email traffic is predicted to grow to over 333.2 billion emails sent per day (from the current 306.4 billion emails). And as long as businesses continue to use email, cybercriminals will find new ways to exploit security gaps, software bugs, and basic human nature to extort millions of dollars from their victims.

Read More

Business Email Compromise Discussed on NPR’s Morning Edition

By Brad Wyro posted in BEC, Email Security, News, security, spear phishing, phishing, best practices

0 Comments

business email compromiseEarlier this week, I heard an interesting interview on NPR’s Morning Edition with a recent victim of Business Email Compromise (BEC), a growing threat that uses social engineering to exploit human nature in order to divert massive amounts of money to cybercriminals.

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in antispam, Email How To, Email Security, malware, security, anti-spam, spear phishing, phishing, best practices, email security

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

Subscribe to Email Updates