MDaemon Technologies Blog

Watch out for election season phishing and social engineering attacks

By Brad Wyro posted in Email Security, Phishing, Email Security Best Practices, Email Best Practices

0 Comments

The 2024 presidential election is well under way in the United States, and that means cybercriminals are exploiting heightened public interest and uncertainty to launch targeted attacks using phishing and social engineering tactics. Here’s how they typically do it:

Read More

Protect Accounts from Hackers: 9 Tips for Stronger Passwords

By Brad Wyro posted in Cybersecurity, Email Security Best Practices, Email Best Practices, Passwords

0 Comments

Passwords have been the primary mechanism for online security for years, but many people continue to use poor habits when creating passwords, and this trend appears to be getting worse as the average online user has to keep track of up to 100 accounts.

Read More

Protect Yourself from IRS Tax Filing Phishing Scams

By Brad Wyro posted in Phishing, Email Security Best Practices, tax scams

0 Comments

The April 15 tax filing deadline is approaching. Learn how to safeguard yourself from IRS tax filing phishing scams that can compromise your personal information and financial security.

Read More

Stay One Step Ahead: Anti-Phishing Best Practices for Your Business

By Brad Wyro posted in Email Security, Phishing, Email Security Best Practices, Email Best Practices

0 Comments

Protect your business from phishing attacks with these essential best practices. Stay one step ahead of cybercriminals and safeguard your sensitive data.

Read More

DMARC Best Practices: Securing Your Email Communications

By Brad Wyro posted in Email How To, Email Security, Anti-Spoofing, Email Spoofing, Email Security Best Practices

0 Comments

Discover the best practices for securing your email communications with DMARC and its importance in preventing email fraud and phishing attacks.

Read More

How to Secure your Business Email as Employees Work from Home

By Brad Wyro posted in Data Leak Prevention, Email Privacy, Email Security, Email Encryption, Cybersecurity, Security Gateway for Email, Stop Spam Email, Email Security Best Practices, Two-Factor Authentication, Email Best Practices

0 Comments

The COVID-19 crisis has changed the way we approach data privacy and email security as the transition to working from home has been accompanied by a growing surge of Coronavirus themed phishing scams and spoofed websites used to distribute malware or lure victims into providing confidential information.

Read More

15 Best Practices for Protecting Your Email with Security Gateway

By Brad Wyro posted in Email Security, Security Gateway for Email, Email Security Best Practices, Two-Factor Authentication, Email Best Practices

0 Comments

 

Despite the rumors announcing the death of email, its use continues to grow. According to research from the Radicati Group, email traffic is predicted to grow to over 333.2 billion emails sent per day (from the current 306.4 billion emails). And as long as businesses continue to use email, cybercriminals will find new ways to exploit security gaps, software bugs, and basic human nature to extort millions of dollars from their victims.

Read More

Business Email Compromise Discussed on NPR’s Morning Edition

By Brad Wyro posted in Business Email Compromise, Email Security, Cybersecurity, Spear Phishing, Phishing, Email Security Best Practices

0 Comments

business email compromiseEarlier this week, I heard an interesting interview on NPR’s Morning Edition with a recent victim of Business Email Compromise (BEC), a growing threat that uses social engineering to exploit human nature in order to divert massive amounts of money to cybercriminals.

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Email Security Best Practices

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

 

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

SSL & TLS Best Practices

By Brad Wyro posted in Email Security, Email Encryption, Email Security Best Practices, Two-Factor Authentication, Email Security Trends, Email Best Practices

6 Comments

 

You may have heard the terms SSL and TLS, but do you know what they are and how they’re different?

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates