MDaemon Technologies Blog

Watch out for election season phishing and social engineering attacks

By Brad Wyro posted in Email Security, Phishing, Email Security Best Practices, Email Best Practices

0 Comments

The 2024 presidential election is well under way in the United States, and that means cybercriminals are exploiting heightened public interest and uncertainty to launch targeted attacks using phishing and social engineering tactics. Here’s how they typically do it:

Read More

Protect Accounts from Hackers: 9 Tips for Stronger Passwords

By Brad Wyro posted in Cybersecurity, Email Security Best Practices, Email Best Practices, Passwords

0 Comments

Passwords have been the primary mechanism for online security for years, but many people continue to use poor habits when creating passwords, and this trend appears to be getting worse as the average online user has to keep track of up to 100 accounts.

Read More

Stay One Step Ahead: Anti-Phishing Best Practices for Your Business

By Brad Wyro posted in Email Security, Phishing, Email Security Best Practices, Email Best Practices

0 Comments

Protect your business from phishing attacks with these essential best practices. Stay one step ahead of cybercriminals and safeguard your sensitive data.

Read More

Why Choose On-premise Email over Microsoft 365? Six Security Benefits

By Brad Wyro posted in Cloud, Email Security, MDaemon Email Server, Email Best Practices

0 Comments

Having an on-premise mail server has many benefits in the areas of security, control, compliance, customization, and cost. Today, we focus on the security benefits.

Read More

Top 9 Email Security Tips to Protect Against Spam, Phishing & Malware

By Brad Wyro posted in Anti-Relay, Attachments, Bayesian Learning, Content Filter, Data Leak Prevention, Email Authentication, DNS-BL, Email How To, Email Security, Macros, Cybersecurity, MDaemon Email Server, Security Gateway for Email, Spear Phishing, Email Spoofing, Anti-Virus, Backscatter, Phishing, Email Best Practices, Passwords

0 Comments

As cyber threats evolve, we face growing email security challenges. Hackers and cyber criminals relentlessly continue to attack businesses as users continue to fall for email scams. That’s why we must continue to be aware of the best practices for securing our email.

Read More

Lessons from Data Breaches Improve Work From Home Security

By Brad Wyro posted in Data Leak Prevention, Email Security, Email Encryption, Stop Spam Email, Two-Factor Authentication, Email Best Practices

0 Comments

 

2020 has been a banner year for cybercriminals. They have stolen billions of dollars and data on billions of individuals by preying on widespread fear and uncertainty brought on by the COVID-19 pandemic.

Read More

Best Practices for Securing Work Devices from Any Remote Location

By Brad Wyro posted in Data Leak Prevention, Email Encryption, MDaemon Email Server, Security Gateway for Email, Email Server, Two-Factor Authentication, Email Best Practices

0 Comments

 

As we all know, unprecedented numbers of employees are working from home during this pandemic year. In fact, one recent survey by SaaS marketing agency Bay Leaf Digital found that 65 percent of newly WFH employees are now using company devices from home – and 42 percent are experiencing unstable access including issues with connecting to remote desktops, poor VPN, etc.

Read More

Microsoft 365 Vulnerabilities Your Healthcare Business Should Consider

By Brad Wyro posted in Email Gateway How-To, Email Security, Stop Spam Email, Phishing, Two-Factor Authentication, Health Care Security, Email Best Practices

0 Comments

The COVID-19 pandemic has accelerated the adoption of cloud services across all industries, but particularly for healthcare providers. If your healthcare organization is considering moving your email from on-premise servers to the cloud, you must do your due diligence around significant security drawbacks that may overshadow the perceived benefits.

Read More

Phishing Email Targets Healthcare to Get Past Microsoft Security

By Brad Wyro posted in Email Gateway How-To, Email Security, Stop Spam Email, Phishing, Two-Factor Authentication, Health Care Security, Email Best Practices

0 Comments

 

The COVID-19 pandemic has been a boon for bad actors across the digital landscape. In July, for instance, authorities in the U.S., U.K. and Canada all issued warnings about serious cyberattacks against healthcare organizations and others involved in the coronavirus response. The purpose of these attacks? Theft of intellectual property during the race to develop a vaccine. The tool of choice? Spear-phishing email attacks.

Read More

How To Protect Your Email from Cyber Threats

By Brad Wyro posted in Email Gateway How-To, Email Privacy, Cybersecurity, Two-Factor Authentication, Email Best Practices

0 Comments

We live in an era where the amount of valuable data businesses must store is increasing at an unprecedented pace. Consequently, the number of cyber criminals trying to gain access to that data is also increasing. In fact, according to a report released last year by Osterman Research, 81% of organizations have been the victim of some type of data breach, targeted email attack, successful phishing attack or other cyber security incident during the previous 12 months. And with the surge of people working from home due to the COVID-19 pandemic, these numbers are only going to go up.

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates