MDaemon Technologies Blog

Recent Business Email Compromise Scams - Reminder to Educate Users

By Brad Wyro posted in Business Email Compromise, Email Security, spear phishing, spoofing, phishing, email security

0 Comments

Online scams are nothing new. But as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.

Read More

Security Gateway a High Performer Again – G2 Crowd 2019 Fall Report

By Brad Wyro posted in email gateway, Email Security, encryption, News, SecurityGateway, Archiving, email security, spam filter

0 Comments

We’re proG2 Crowd High Performer 2019ud to announce that Security Gateway for Email has once again been named a High Performer in Secure Email Gateways by G2 Crowd in their Fall Report. And if you are looking for a hosted solution, Security Gateway also was recognized as a top Cloud Email Security solution.

Read More

Phishing Email Uses Google Drive to Get Past Microsoft Security

By Brad Wyro posted in BEC, Business Email Compromise, Email Security, spear phishing, phishing, email security, spam filter

0 Comments

This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients.  The email came from Google Drive, but the sender address didn't match the company's standard naming convention for email addresses.

Read More

Security Gateway’s Built-in Archiving and Cloud-Based Email Integration Just got a Major Update!

By Brad Wyro posted in Email Security, Product Updates, Email Archiving

0 Comments

SG_New-Archiving-Cloud-Email-Features-2

When it comes to email archiving, businesses require features that go beyond simple message replication in order to meet expanding regulations. And because every email solution, whether it’s on-premises or in the cloud, needs strong anti-spam/anti-malware filtering, it makes sense to combine archiving and security into a single product. To address the growing demand for a combined email security/archiving solution, archiving was added to Security Gateway for Email Servers in version 6.0.

Read More

Not Today, Scammer! Today's Phishing Attempt

By Brad Wyro posted in Email Security, security, spam, phishing

0 Comments

A brief glance through my Spam folder in MDaemon Webmail today reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. Because businesses have already lost millions of dollars to these scams and continue to fall victim every day, it bears repeating that, while spam filters and secure email gateways continue to improve, no solution is 100% fool-proof.

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in antispam, Email How To, Email Security, malware, security, anti-spam, spear phishing, phishing, best practices, email security

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

Another day, another attempt to scam me - but I know a phishing attempt when I see one!

By Brad Wyro posted in BEC, CEO Fraud, Email Security, security, spam, phishing, email security

0 Comments

OhNo-I-clicked-2 (1)It's just a fact of life: If there's email, there will always be spam. Now, how much spam you have to deal with will depend on how good your spam filtering solution is. Here at MDaemon Technologies, we use our own products - MDaemon and Security Gateway, to filter out spam, malware, phishing attempts, and all of the other junk that often floods inboxes of users whose email server or hosted service isn't as effective.

Read More

Best Practices to Avoid Business Email Compromise & CEO Fraud Attacks

By Brad Wyro posted in Email Best Practices, Email Security

0 Comments

Top 10 Business Email Compromise Protection Tips

In part one of our three-part series on Business Email Compromise (BEC), I explained what a BEC attack is and provided examples and statistics. As you’ll recall from the examples discussed, businesses have suffered staggering losses to these attacks, and while users are becoming more aware of them, their own human nature dictates that these threats will continue. In fact, a recent report by Get Safe Online indicated that over a third (37%) of employees don’t know what to look for to identify common email scams. The report also stated that one in 20 email fraud victims were so ashamed that they hid their mistakes from their colleagues.

Read More

Four-Step Swindle: The Anatomy of a Business Email Compromise Attack

By Brad Wyro posted in BEC, Business Email Compromise, CEO Fraud, Email Security, spear phishing, phishing, Trending

0 Comments

This week, we continue our series on Business Email Compromise. Click here to read Part 1, which includes an overview and various statistics on this growing threat.

Read More

Avoid Being a Victim in Today's Massive Ransomware Outbreak

By Brad Wyro posted in DKIM, Email Security, malware, security, anti-spam, phishing, best practices, email security

0 Comments

 

As I was coaxing myself awake this morning with my usual jolt of strong coffee, I checked my favorite news sites & was informed of yet another ransomware attack. This one, which is believed to have originated from Ukraine, was first thought to be a variation of last year's Petya ransomware outbreak, but upon further investigation, it appears that today's malware is a new type - a worm that some computer experts are referring to as "NotPetya". This attack demands a smaller ransom (in comparison to other attacks) of approximately $300, and then begins to serve its primary purpose - to wipe files on the computer. According to researchers at Symantec, this attack used the same National Security Agency hacking tool, Eternal Blue, that was used in the WannaCry outbreak, as well as two other methods to spread the attack. According to information provided by this article on CNN, if you've installed all of the latest Windows patches, you should be safe from this particular strain of malware, however, by no means is this a reason to be complacent. Administrators and end users must still be mindful of safety precautions.

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates