MDaemon Technologies Blog

How To Protect Your Email from Cyber Threats

By Brad Wyro posted in security, how-to, privacy, email security, two-factor authentication, webmail

0 Comments

We live in an era where the amount of valuable data businesses must store is increasing at an unprecedented pace. Consequently, the number of cyber criminals trying to gain access to that data is also increasing. In fact, according to a report released last year by Osterman Research, 81% of organizations have been the victim of some type of data breach, targeted email attack, successful phishing attack or other cyber security incident during the previous 12 months. And with the surge of people working from home due to the COVID-19 pandemic, these numbers are only going to go up.

Read More

The Coronavirus pandemic comes with a spike in online email scams, and changes to how we work

By Brad Wyro posted in Email Best Practices, security, spear phishing, spoofing, phishing, email security

0 Comments

Stories of the COVID-19 pandemic’s rapid global spread have paved the way for threat actors to unleash the most widely-used cyber threat in recent memory.

Read More

15 Best Practices for Protecting Your Email with Security Gateway

By Brad Wyro posted in Email Best Practices, Email Security, Security Gateway, SecurityGateway, best practices, email security

0 Comments

Despite the rumors announcing the death of email, its use continues to grow. According to research from the Radicati Group, email traffic is predicted to grow to over 333.2 billion emails sent per day (from the current 306.4 billion emails). And as long as businesses continue to use email, cybercriminals will find new ways to exploit security gaps, software bugs, and basic human nature to extort millions of dollars from their victims.

Read More

Protect Office 365 with Security Gateway for Email

By Brad Wyro posted in Email Security, anti-spam, privacy, SecurityGateway, email security, Office365

0 Comments

At about this time last year, Office 365 had around 155 million users, and businesses continue to adopt its services at a rate of around 3 million users per month. But as subscription rates continue to grow, it becomes a growing target for cybercriminals to spread phishing and ransomware attacks.

Read More

Recent Business Email Compromise (BEC) Scams are Reminder to Educate Users

By Brad Wyro posted in Business Email Compromise, Email Security, spear phishing, spoofing, phishing, email security

0 Comments

Online scams are nothing new. But as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.

Read More

Security Gateway a High Performer Again – G2 Crowd 2019 Fall Report

By Brad Wyro posted in email gateway, Email Security, encryption, News, SecurityGateway, Archiving, email security, spam filter

0 Comments

We’re proG2 Crowd High Performer 2019ud to announce that Security Gateway for Email has once again been named a High Performer in Secure Email Gateways by G2 Crowd in their Fall Report. And if you are looking for a hosted solution, Security Gateway also was recognized as a top Cloud Email Security solution.

Read More

Phishing Email Uses Google Drive to Get Past Microsoft Security

By Brad Wyro posted in BEC, Business Email Compromise, Email Security, spear phishing, phishing, email security, spam filter

0 Comments

This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients.  The email came from Google Drive, but the sender address didn't match the company's standard naming convention for email addresses.

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in antispam, Email How To, Email Security, malware, security, anti-spam, spear phishing, phishing, best practices, email security

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

Another day, another attempt to scam me - but I know a phishing attempt when I see one!

By Brad Wyro posted in BEC, CEO Fraud, Email Security, security, spam, phishing, email security

0 Comments

Avoid phishing scamsIt's just a fact of life: If there's email, there will always be spam. Now, how much spam you have to deal with will depend on how good your spam filtering solution is. Here at MDaemon Technologies, we use our own products - MDaemon and Security Gateway, to filter out spam, malware, phishing attempts, and all of the other junk that often floods inboxes of users whose email server or hosted service isn't as effective.

Read More

Subscribe to Email Updates