2020 has been a banner year for cybercriminals. They have stolen billions of dollars and data on billions of individuals by preying on widespread fear and uncertainty brought on by the COVID-19 pandemic.
By Brad Wyro posted in Data Leak Prevention, Email Security, Email Encryption, Stop Spam Email, Two-Factor Authentication, Email Best Practices
2020 has been a banner year for cybercriminals. They have stolen billions of dollars and data on billions of individuals by preying on widespread fear and uncertainty brought on by the COVID-19 pandemic.
By Brad Wyro posted in Data Leak Prevention, Email Encryption, MDaemon Email Server, Security Gateway for Email, Email Server, Two-Factor Authentication, Email Best Practices
As we all know, unprecedented numbers of employees are working from home during this pandemic year. In fact, one recent survey by SaaS marketing agency Bay Leaf Digital found that 65 percent of newly WFH employees are now using company devices from home – and 42 percent are experiencing unstable access including issues with connecting to remote desktops, poor VPN, etc.
By Brad Wyro posted in Email Gateway How-To, Email Security, Stop Spam Email, Phishing, Two-Factor Authentication, Health Care Security, Email Best Practices
The COVID-19 pandemic has accelerated the adoption of cloud services across all industries, but particularly for healthcare providers. If your healthcare organization is considering moving your email from on-premise servers to the cloud, you must do your due diligence around significant security drawbacks that may overshadow the perceived benefits.
By Brad Wyro posted in Email Gateway How-To, Email Security, Stop Spam Email, Phishing, Two-Factor Authentication, Health Care Security, Email Best Practices
The COVID-19 pandemic has been a boon for bad actors across the digital landscape. In July, for instance, authorities in the U.S., U.K. and Canada all issued warnings about serious cyberattacks against healthcare organizations and others involved in the coronavirus response. The purpose of these attacks? Theft of intellectual property during the race to develop a vaccine. The tool of choice? Spear-phishing email attacks.
By Brad Wyro posted in Email Gateway How-To, Email Privacy, Cybersecurity, Two-Factor Authentication, Email Best Practices
We live in an era where the amount of valuable data businesses must store is increasing at an unprecedented pace. Consequently, the number of cyber criminals trying to gain access to that data is also increasing. In fact, according to a report released last year by Osterman Research, 81% of organizations have been the victim of some type of data breach, targeted email attack, successful phishing attack or other cyber security incident during the previous 12 months. And with the surge of people working from home due to the COVID-19 pandemic, these numbers are only going to go up.
By Brad Wyro posted in Data Leak Prevention, Email Privacy, Email Security, Email Encryption, Cybersecurity, Security Gateway for Email, Stop Spam Email, Email Security Best Practices, Two-Factor Authentication, Email Best Practices
The COVID-19 crisis has changed the way we approach data privacy and email security as the transition to working from home has been accompanied by a growing surge of Coronavirus themed phishing scams and spoofed websites used to distribute malware or lure victims into providing confidential information.
By Brad Wyro posted in Cybersecurity, Spear Phishing, Email Spoofing, Phishing, Two-Factor Authentication, Email Best Practices
Stories of the COVID-19 pandemic’s rapid global spread have paved the way for threat actors to unleash the most widely-used cyber threat in recent memory.
By Brad Wyro posted in Email Security, Security Gateway for Email, Email Security Best Practices, Two-Factor Authentication, Email Best Practices
Despite the rumors announcing the death of email, its use continues to grow. According to research from the Radicati Group, email traffic is predicted to grow to over 333.2 billion emails sent per day (from the current 306.4 billion emails). And as long as businesses continue to use email, cybercriminals will find new ways to exploit security gaps, software bugs, and basic human nature to extort millions of dollars from their victims.
By Brad Wyro posted in Industry Insight, Two-Factor Authentication, Email Best Practices
While many businesses are moving their email from on-premises to the cloud, many that have already made the switch have discovered that cloud hosted email has its share of drawbacks to go along with the benefits these businesses had originally sought.
By Brad Wyro posted in Email Security, Two-Factor Authentication, Email Best Practices
In part one of our three-part series on Business Email Compromise (BEC), I explained what a BEC attack is and provided examples and statistics. As you’ll recall from the examples discussed, businesses have suffered staggering losses to these attacks, and while users are becoming more aware of them, their own human nature dictates that these threats will continue. In fact, a recent report by Get Safe Online indicated that over a third (37%) of employees don’t know what to look for to identify common email scams. The report also stated that one in 20 email fraud victims were so ashamed that they hid their mistakes from their colleagues.
MDaemon Technologies is a pioneer in developing email and email security software helping to protect customers from evolving cyber-security threats. Its products and services are trusted by thousands of organizations in over 140 countries. For more than two decades, the company’s products have been developed with the ongoing input of IT professionals who demand reliable, affordable software that requires minimal effort to manage.
The software can be deployed in virtual, hosted cloud, on-premises, or hybrid network environments. The company sells its software and services directly and through a network of global channel partners.
For more information, visit www.mdaemon.com.
Copyright © 1996-2023 MDaemon Technologies. View privacy policy.