MDaemon Technologies Blog

How To Protect Your Email from Cyber Threats

By Brad Wyro posted in security, how-to, privacy, email security, two-factor authentication, webmail

0 Comments

We live in an era where the amount of valuable data businesses must store is increasing at an unprecedented pace. Consequently, the number of cyber criminals trying to gain access to that data is also increasing. In fact, according to a report released last year by Osterman Research, 81% of organizations have been the victim of some type of data breach, targeted email attack, successful phishing attack or other cyber security incident during the previous 12 months. And with the surge of people working from home due to the COVID-19 pandemic, these numbers are only going to go up.

Read More

How to Secure your Business Email as Employees Work from Home

By Brad Wyro posted in data leak prevention, DLP, Email Privacy, Email Security, pgp, security, privacy, Security Gateway, SecurityGateway, send later, spam, SSL, Webmail, best practices, compliance, Email Encryption, spam filter, two-factor authentication

0 Comments

The COVID-19 crisis has changed the way we approach data privacy and email security as the transition to working from home has been accompanied by a growing surge of Coronavirus themed phishing scams and spoofed websites used to distribute malware or lure victims into providing confidential information.

Read More

The Coronavirus pandemic comes with a spike in online email scams, and changes to how we work

By Brad Wyro posted in Email Best Practices, security, spear phishing, spoofing, phishing, email security

0 Comments

 

Stories of the COVID-19 pandemic’s rapid global spread have paved the way for threat actors to unleash the most widely-used cyber threat in recent memory.

Read More

Business Email Compromise Discussed on NPR’s Morning Edition

By Brad Wyro posted in BEC, Email Security, News, security, spear phishing, phishing, best practices

0 Comments

business email compromiseEarlier this week, I heard an interesting interview on NPR’s Morning Edition with a recent victim of Business Email Compromise (BEC), a growing threat that uses social engineering to exploit human nature in order to divert massive amounts of money to cybercriminals.

Read More

Expiring Support for Older Software: Renew & Upgrade for the Latest Features & Improved Security!

By Brad Wyro posted in News, security, mdaemon, Product Updates, renew, SecurityGateway, upgrade

0 Comments

As our products have evolved over the years, with new features added regularly, older versions of our software are eventually no longer supported.

Read More

Not Today, Scammer! Today's Phishing Attempt

By Brad Wyro posted in Email Security, security, spam, phishing

0 Comments

A brief glance through my Spam folder in MDaemon Webmail today reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. Because businesses have already lost millions of dollars to these scams and continue to fall victim every day, it bears repeating that, while spam filters and secure email gateways continue to improve, no solution is 100% fool-proof.

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in antispam, Email How To, Email Security, malware, security, anti-spam, spear phishing, phishing, best practices, email security

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

Another day, another attempt to scam me - but I know a phishing attempt when I see one!

By Brad Wyro posted in BEC, CEO Fraud, Email Security, security, spam, phishing, email security

0 Comments

OhNo-I-clicked-2 (1)It's just a fact of life: If there's email, there will always be spam. Now, how much spam you have to deal with will depend on how good your spam filtering solution is. Here at MDaemon Technologies, we use our own products - MDaemon and Security Gateway, to filter out spam, malware, phishing attempts, and all of the other junk that often floods inboxes of users whose email server or hosted service isn't as effective.

Read More

Avoid Being a Victim in Today's Massive Ransomware Outbreak

By Brad Wyro posted in DKIM, Email Security, malware, security, anti-spam, phishing, best practices, email security

0 Comments

 

As I was coaxing myself awake this morning with my usual jolt of strong coffee, I checked my favorite news sites & was informed of yet another ransomware attack. This one, which is believed to have originated from Ukraine, was first thought to be a variation of last year's Petya ransomware outbreak, but upon further investigation, it appears that today's malware is a new type - a worm that some computer experts are referring to as "NotPetya". This attack demands a smaller ransom (in comparison to other attacks) of approximately $300, and then begins to serve its primary purpose - to wipe files on the computer. According to researchers at Symantec, this attack used the same National Security Agency hacking tool, Eternal Blue, that was used in the WannaCry outbreak, as well as two other methods to spread the attack. According to information provided by this article on CNN, if you've installed all of the latest Windows patches, you should be safe from this particular strain of malware, however, by no means is this a reason to be complacent. Administrators and end users must still be mindful of safety precautions.

Read More

Steps to Track Spam Sent Out From a Local Machine on Your Network

By Brad Wyro posted in antispam, Email How To, Email Security, security, anti-spam, how-to, tutorial, spampot, Trending

0 Comments

Has this happened to you? Let’s say you’re the MDaemon administrator for your company, and you’ve noticed that somewhere, somehow, spam messages are being sent from within your network. Perhaps one of your PCs has been compromised. What do you do? Here are some tips to help you track the issue down.

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates