The COVID-19 crisis has changed the way we approach data privacy and email security as the transition to working from home has been accompanied by a growing surge of Coronavirus themed phishing scams and spoofed websites used to distribute malware or lure victims into providing confidential information.
How to Secure your Business Email as Employees Work from Home
By Brad Wyro posted in Data Leak Prevention, Email Privacy, Email Security, Email Encryption, Cybersecurity, Security Gateway for Email, Stop Spam Email, Email Security Best Practices, Two-Factor Authentication, Email Best Practices
The Coronavirus pandemic comes with a spike in online email scams, and changes to how we work
By Brad Wyro posted in Cybersecurity, Spear Phishing, Email Spoofing, Phishing, Two-Factor Authentication, Email Best Practices
Stories of the COVID-19 pandemic’s rapid global spread have paved the way for threat actors to unleash the most widely-used cyber threat in recent memory.
Business Email Compromise Discussed on NPR’s Morning Edition
By Brad Wyro posted in Business Email Compromise, Email Security, Cybersecurity, Spear Phishing, Phishing, Email Security Best Practices
Earlier this week, I heard an interesting interview on NPR’s Morning Edition with a recent victim of Business Email Compromise (BEC), a growing threat that uses social engineering to exploit human nature in order to divert massive amounts of money to cybercriminals.
Renew Older Software for the Latest Features & Improved Security!
By Brad Wyro posted in Cybersecurity, MDaemon Email Server, Product Updates, Security Gateway for Email, Email Server
As our products have evolved over the years, with new features added regularly, older versions of our software are eventually no longer supported.
Not Today, Scammer! Today's Phishing Attempt
By Brad Wyro posted in Email Security, Cybersecurity, Stop Spam Email, Phishing
A brief glance through my Spam folder in MDaemon Webmail today reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. Because businesses have already lost millions of dollars to these scams and continue to fall victim every day, it bears repeating that, while spam filters and secure email gateways continue to improve, no solution is 100% fool-proof.
10 Tips to Identify a Phishing Email
By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Email Security Best Practices
Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.
Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.
Another day, another attempt to scam me - but I know a phishing attempt when I see one!
By Brad Wyro posted in Business Email Compromise, Email Security, Cybersecurity, Stop Spam Email, Phishing
It's just a fact of life: If there's email, there will always be spam. Now, how much spam you have to deal with will depend on how good your spam filtering solution is. Here at MDaemon Technologies, we use our own products - MDaemon and Security Gateway, to filter out spam, malware, phishing attempts, and all of the other junk that often floods inboxes of users whose email server or hosted service isn't as effective.
MDaemon's Dynamic Screening Blocks Hackers from Guessing Passwords
By Brad Wyro posted in Email Gateway How-To, Cybersecurity, MDaemon Email Server, Email Server
If you have an email account (and in 2017, you probably have more than one), you are a target. More specifically, your email password is a target and a coveted prize for hackers. And let’s face it – hackers are not going away anytime soon. Because the barriers to entry are so low and the potential payoffs so large, hackers are more motivated than ever to try to steal your login credentials. As an MDaemon administrator, you are tasked with making sure your users use strong passwords, but here are a few things to consider when evaluating your password & security policies:
Steps to Track Spam Sent Out From a Local Machine on Your Network
By Brad Wyro posted in Email Gateway How-To, Email How To, Email Security, Cybersecurity, Stop Spam Email, Tutorial, Email Security Trends
Has this happened to you? Let’s say you’re the MDaemon administrator for your company, and you’ve noticed that somewhere, somehow, spam messages are being sent from within your network. Perhaps one of your PCs has been compromised. What do you do? Here are some tips to help you track the issue down.
Server-side Encryption, Decryption & Key Management with OpenPGP
By Brad Wyro posted in Email How To, Email Security, Email Encryption, Cybersecurity, Health Care Security
Whether you work in health care, finance, government, or any other field that requires the storage of data, there's always someone out there who would love to gain access to your confidential records. Don't let the bad guys steal your data. Protect it with server-side encryption. Our latest release of MDaemon supports OpenPGP, which allows MDaemon to perform encryption, decryption, and key management tasks. Learn how to enable OpenPGP support in MDaemon, and how to send encrypted mail in our latest video.