As cyber threats evolve, we face growing email security challenges. Hackers and cyber criminals relentlessly continue to attack businesses as users continue to fall for email scams. That’s why we must continue to be aware of the best practices for securing our email.
Top 9 Email Security Tips to Protect Against Spam, Phishing & Malware
By Brad Wyro posted in Anti-Relay, Attachments, Bayesian Learning, Content Filter, Data Leak Prevention, Email Authentication, DNS-BL, Email How To, Email Security, Macros, Cybersecurity, MDaemon Email Server, Security Gateway for Email, Spear Phishing, Email Spoofing, Anti-Virus, Backscatter, Phishing, Email Best Practices, Passwords
Beyond Hackers: Identify and Mitigate Insider Threats to Your Data
By Brad Wyro posted in Data Leak Prevention, Email Security, Cybersecurity, Anti-Spoofing, Security Gateway for Email, Spear Phishing, Email Spoofing, Phishing, insider threats
Jean Patrice Delia was an engineer at GE when he decided to steal company data and use trade secrets, pricing information, marketing data, and other documents and funnel them to his business partner to compete against GE. After an FBI investigation, Delia was arrested and sentenced to two years in prison and ordered to pay $1.4 million in restitution. His business partner, Miguel Sernas, spent nearly a year in jail and was also ordered to pay $1.4 million.
Business Email Compromise Scams are Reminder to Educate Users
By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Email Spoofing, Phishing
Online scams are nothing new -- but as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.
10 Tips to Help Healthcare Employees Identify a Phishing Email
By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Health Care Security
Whether you run a multi-campus medical center or a small private practice, you’ve likely heard about cyber criminals who try to trick you and your employees into clicking a link or downloading an attachment so they can steal your organization’s money or protected data.
Business Email Compromise Scams are Reminder to Educate Users
By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Email Spoofing, Phishing, Health Care Security
Online scams are nothing new -- but as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.
The Coronavirus pandemic comes with a spike in online email scams, and changes to how we work
By Brad Wyro posted in Cybersecurity, Spear Phishing, Email Spoofing, Phishing, Two-Factor Authentication, Email Best Practices
Stories of the COVID-19 pandemic’s rapid global spread have paved the way for threat actors to unleash the most widely-used cyber threat in recent memory.
Business Email Compromise Discussed on NPR’s Morning Edition
By Brad Wyro posted in Business Email Compromise, Email Security, Cybersecurity, Spear Phishing, Phishing, Email Security Best Practices
Earlier this week, I heard an interesting interview on NPR’s Morning Edition with a recent victim of Business Email Compromise (BEC), a growing threat that uses social engineering to exploit human nature in order to divert massive amounts of money to cybercriminals.
Recent Business Email Compromise Scams - Reminder to Educate Users
By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Email Spoofing, Phishing
Online scams are nothing new. But as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.
Phishing Email Uses Google Drive to Get Past Microsoft Security
By Brad Wyro posted in Business Email Compromise, Email Security, Stop Spam Email, Spear Phishing, Phishing
This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients. The email came from Google Drive, but the sender address didn't match the company's standard naming convention for email addresses.
10 Tips to Identify a Phishing Email
By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Email Security Best Practices
Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.
Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.