MDaemon Technologies Blog

Top 9 Email Security Tips to Protect Against Spam, Phishing & Malware

By Brad Wyro posted in Anti-Relay, Attachments, Bayesian Learning, Content Filter, Data Leak Prevention, Email Authentication, DNS-BL, Email How To, Email Security, Macros, Cybersecurity, MDaemon Email Server, Security Gateway for Email, Spear Phishing, Email Spoofing, Anti-Virus, Backscatter, Phishing, Email Best Practices, Passwords

0 Comments

As cyber threats evolve, we face growing email security challenges. Hackers and cyber criminals relentlessly continue to attack businesses as users continue to fall for email scams. That’s why we must continue to be aware of the best practices for securing our email.

Read More

Beyond Hackers: Identify and Mitigate Insider Threats to Your Data

By Brad Wyro posted in Data Leak Prevention, Email Security, Cybersecurity, Anti-Spoofing, Security Gateway for Email, Spear Phishing, Email Spoofing, Phishing, insider threats

0 Comments

Jean Patrice Delia was an engineer at GE when he decided to steal company data and use trade secrets, pricing information, marketing data, and other documents and funnel them to his business partner to compete against GE. After an FBI investigation, Delia was arrested and sentenced to two years in prison and ordered to pay $1.4 million in restitution. His business partner, Miguel Sernas, spent nearly a year in jail and was also ordered to pay $1.4 million. 

Read More

Business Email Compromise Scams are Reminder to Educate Users

By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Email Spoofing, Phishing

0 Comments

Online scams are nothing new -- but as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.

Read More

10 Tips to Help Healthcare Employees Identify a Phishing Email

By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Health Care Security

0 Comments

 

Whether you run a multi-campus medical center or a small private practice, you’ve likely heard about cyber criminals who try to trick you and your employees into clicking a link or downloading an attachment so they can steal your organization’s money or protected data.

Read More

Business Email Compromise Scams are Reminder to Educate Users

By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Email Spoofing, Phishing, Health Care Security

0 Comments

Online scams are nothing new -- but as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.

Read More

The Coronavirus pandemic comes with a spike in online email scams, and changes to how we work

By Brad Wyro posted in Cybersecurity, Spear Phishing, Email Spoofing, Phishing, Two-Factor Authentication, Email Best Practices

0 Comments

 

Stories of the COVID-19 pandemic’s rapid global spread have paved the way for threat actors to unleash the most widely-used cyber threat in recent memory.

Read More

Business Email Compromise Discussed on NPR’s Morning Edition

By Brad Wyro posted in Business Email Compromise, Email Security, Cybersecurity, Spear Phishing, Phishing, Email Security Best Practices

0 Comments

business email compromiseEarlier this week, I heard an interesting interview on NPR’s Morning Edition with a recent victim of Business Email Compromise (BEC), a growing threat that uses social engineering to exploit human nature in order to divert massive amounts of money to cybercriminals.

Read More

Recent Business Email Compromise Scams - Reminder to Educate Users

By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Email Spoofing, Phishing

0 Comments

Online scams are nothing new. But as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.

 

Read More

Phishing Email Uses Google Drive to Get Past Microsoft Security

By Brad Wyro posted in Business Email Compromise, Email Security, Stop Spam Email, Spear Phishing, Phishing

0 Comments

This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients.  The email came from Google Drive, but the sender address didn't match the company's standard naming convention for email addresses.

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Email Security Best Practices

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

 

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates