MDaemon Technologies Blog

Microsoft 365 Vulnerabilities Your Healthcare Business Should Consider

By Brad Wyro posted in email, Email Best Practices, email gateway, Email Security, phishing, e-sign, email security, spam filter, healthcare, health care

0 Comments

The COVID-19 pandemic has accelerated the adoption of cloud services across all industries, but particularly for healthcare providers. If your healthcare organization is considering moving your email from on-premise servers to the cloud, you must do your due diligence around significant security drawbacks that may overshadow the perceived benefits.

Read More

Phishing Email Targets Healthcare to Get Past Microsoft Security

By Brad Wyro posted in email, Email Best Practices, email gateway, Email Security, phishing, e-sign, email security, spam filter, healthcare, health care

0 Comments

 

The COVID-19 pandemic has been a boon for bad actors across the digital landscape. In July, for instance, authorities in the U.S., U.K. and Canada all issued warnings about serious cyberattacks against healthcare organizations and others involved in the coronavirus response. The purpose of these attacks? Theft of intellectual property during the race to develop a vaccine. The tool of choice? Spear-phishing email attacks.

Read More

The Coronavirus pandemic comes with a spike in online email scams, and changes to how we work

By Brad Wyro posted in Email Best Practices, security, spear phishing, spoofing, phishing, email security

0 Comments

 

Stories of the COVID-19 pandemic’s rapid global spread have paved the way for threat actors to unleash the most widely-used cyber threat in recent memory.

Read More

15 Best Practices for Protecting Your Email with Security Gateway

By Brad Wyro posted in Email Best Practices, Email Security, Security Gateway, SecurityGateway, best practices, email security

0 Comments

Despite the rumors announcing the death of email, its use continues to grow. According to research from the Radicati Group, email traffic is predicted to grow to over 333.2 billion emails sent per day (from the current 306.4 billion emails). And as long as businesses continue to use email, cybercriminals will find new ways to exploit security gaps, software bugs, and basic human nature to extort millions of dollars from their victims.

Read More

Office 365 Vulnerabilities Every Business Should Consider

By Brad Wyro posted in Email Best Practices, Industry Insight, Hosted Email

0 Comments

While many businesses are moving their email from on-premises to the cloud, many that have already made the switch have discovered that cloud hosted email has its share of drawbacks to go along with the benefits these businesses had originally sought.

Read More

Best Practices to Avoid Business Email Compromise & CEO Fraud Attacks

By Brad Wyro posted in Email Best Practices, Email Security

0 Comments

Top 10 Business Email Compromise Protection Tips

 

In part one of our three-part series on Business Email Compromise (BEC), I explained what a BEC attack is and provided examples and statistics. As you’ll recall from the examples discussed, businesses have suffered staggering losses to these attacks, and while users are becoming more aware of them, their own human nature dictates that these threats will continue. In fact, a recent report by Get Safe Online indicated that over a third (37%) of employees don’t know what to look for to identify common email scams. The report also stated that one in 20 email fraud victims were so ashamed that they hid their mistakes from their colleagues.

Read More

18 Email Safety Tips Every User Should Know

By Brad Wyro posted in Email Best Practices, Email Security

0 Comments

danger_phishing_scam_sq_1000 (1)

Read More

Follow These 13 Tips to Avoid Being Blacklisted

By Brad Wyro posted in Email Best Practices, Email Security, Trending

0 Comments

Tips to Avoid Being Blacklisted

 

With the prevalence of spam circulating the globe in massive amounts, it becomes increasingly important for administrators to understand the potential causes of their IP address ending up on a blacklist. Spammers employ all kinds of tricks to try to send out as many spam messages as possible without revealing their identities. They do this through various techniques such as social engineering, employing malware, botnets, forging of message headers, and exploiting weaknesses in email systems or network infrastructures. For the spammer, it’s basically a numbers game. It costs next to nothing to send out thousands of spam messages, and if even a small handful of people click on a link or purchase a product advertised in a spam message, the spammer can profit. If your email infrastructure is not properly secured, then you risk being infected with malware and becoming part of a spam botnet. Even if your server is not infected with malware, if your firewall and mail server security settings are not configured properly, your IP address could wind up on a blacklist. To protect yourself from being blacklisted, consider the following recommendations:

Read More

SSL & TLS Best Practices

By Brad Wyro posted in Email Best Practices, Email Security, encryption, cryptography, SSL, best practices, email security, TLS, Trending

0 Comments

You may have heard the terms SSL and TLS, but do you know what they are and how they’re different?

Read More

Is slow email making you pull your hair out? Here's how to improve Microsoft Outlook performance

By Brad Wyro posted in Email Best Practices, Email How To, how-to, performance, Inbox Management, Outlook, best practices, Trending

0 Comments

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates