MDaemon Technologies Blog

How to Enforce Strong Password Policies in MDaemon

By Brad Wyro posted in Email How To, Email Security

2 Comments

These days, hackers are gaining access to increasingly sophisticated tools to steal your usernames and passwords, and they know that people continue to use weak passwords for banking, utilities, and much more. In fact, even in 2024, did you know the word “password” is still among the top ten most common passwords?

Read More

Why You Can’t Rely on Users to Keep Email Secure

By Brad Wyro posted in Email Authentication, Email Security, Anti-Spoofing, Security Gateway for Email, Stop Spam Email, Anti-Virus, insider threats

0 Comments

For hackers, it’s a numbers game. Three billion phishing emails are sent every day, but all they need is for one of them to find a willing victim and do damage to your network. 

If you leave email security up to users, you’re in a world of trouble.

Read More

Beyond Hackers: Identify and Mitigate Insider Threats to Your Data

By Brad Wyro posted in Data Leak Prevention, Email Security, Cybersecurity, Anti-Spoofing, Security Gateway for Email, Spear Phishing, Email Spoofing, Phishing, insider threats

0 Comments

Jean Patrice Delia was an engineer at GE when he decided to steal company data and use trade secrets, pricing information, marketing data, and other documents and funnel them to his business partner to compete against GE. After an FBI investigation, Delia was arrested and sentenced to two years in prison and ordered to pay $1.4 million in restitution. His business partner, Miguel Sernas, spent nearly a year in jail and was also ordered to pay $1.4 million. 

Read More

How to Encrypt Email Messages in SecurityGateway™ for Email

By Brad Wyro posted in Email How To, Email Security, Email Encryption, Security Gateway for Email

0 Comments

The pandemic has ushered in a paradigm shift in how businesses communicate with their customers. As organizations in healthcare, finance, and other highly regulated industries rely more heavily on email communication, their employees continue to send sensitive data such as medical and financial information through email. This makes email privacy more important than ever, and there are several ways to implement it, but with varying levels of complexity.

Read More

Business Email Compromise Scams are Reminder to Educate Users

By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Email Spoofing, Phishing

0 Comments

Online scams are nothing new -- but as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.

Read More

Users Love SecurityGateway™ for Email Servers in G2's Winter Reports

By Kevin Beatty posted in Data Leak Prevention, Email Security, Cybersecurity, Anti-Spoofing, Security Gateway for Email, Anti-Virus

0 Comments

G2 just released their Winter 2022 badges, and SecurityGateway™ for Email Servers continues to rank at the top of the Secure Email Gateway Software category.

Read More

Prevent Data Leaks with SecurityGateway™ for Email Servers

By Brad Wyro posted in Data Leak Prevention, Email Security

0 Comments

If you're a key decision maker in healthcare, government, finance, or any other highly regulated industry, how trusting are you of your employees to protect your company's most valuable asset - its data? Now that businesses have had over a year to adjust to remote work, they've had to put more trust in employees when it comes to the handling of personally identifiable information (PII) of their customers. This has led to a number of data breaches, HIPAA & GDPR violations, and many other incidents. 

These key figures were reported earlier last year, and certainly by now these statistics have increased.

  • Around 25% of email data breaches were caused by employees inappropriately sharing data
  • Over 85% of employees are sending more emails as they continue to work from home
  • About two-thirds of IT leaders have reported data leaks via email since the transition to remote work as a result of the pandemic

Data leaks can occur in many ways. The most common causes of data leaks are insider threats from within the business, hackers who have obtained access to compromised accounts, and users who fell victim to successful phishing and social engineering attacks.

Read More

Email @ 50 The First Killer App

By Kevin Beatty posted in Email Security, Email Software

0 Comments


The First Email Sent

Ray Tomlinson reportedly sent the first network message from computer to computer on October 29, 1971. His development work on the evolving ARPANET (Advanced Research Projects Agency Network), a government-funded network to connect various research facilities, would be the perfect environment for his experiment.

Read More

MDaemon Technologies Helps Specialty Retailer “Fix It and Forget It”

By Brad Wyro posted in Email Security, Security Gateway for Email, Email Security Trends

0 Comments

Specialty Retailer Blog Post (1)

As a small business, what do you do when the big players in a mission-critical industry such as email don’t meet your business’ needs? You find a cost-effective, easy-to-use solution with great customer service – the kind developed by an industry expert. That’s how MDaemon Technologies came to be the email security provider for one specialty retailer in Texas.

Read More

MDaemon Provides the Best Email Solution for County Government

By Brad Wyro posted in Email Security, MDaemon Email Server, Email Software

0 Comments


Costs, Control, Ease of Use

In 2010, the 125 employees of a county in east Illinois -- and their hardworking IT director -- needed a robust, well-integrated email and collaboration solution that accommodated all the security and regulatory needs of county government. It was critical that the solution also be cost-effective and a breeze to use. The cost/benefit analysis left no doubt that MDaemon was the best solution for their needs.


“I’m a ‘one-man band’ supporting a small county government in the middle of nowhere,” the IT director said. “And we needed a much more robust email solution than was being provided by a local ISP.”


Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates