The holiday season is a prime time for email scammers to strike. Learn how to identify and protect yourself from fraudulent emails that could ruin your festive spirit.
Email Scams to Watch Out For During the Holiday Season
By Brad Wyro posted in Cybersecurity, Phishing, Email Security Best Practices, Email Best Practices
Protect Accounts from Hackers: 9 Tips for Stronger Passwords
By Brad Wyro posted in Cybersecurity, Email Security Best Practices, Email Best Practices, Passwords
Passwords have been the primary mechanism for online security for years, but many people continue to use poor habits when creating passwords, and this trend appears to be getting worse as the average online user has to keep track of up to 100 accounts.
Top 9 Email Security Tips to Protect Against Spam, Phishing & Malware
By Brad Wyro posted in Anti-Relay, Attachments, Bayesian Learning, Content Filter, Data Leak Prevention, Email Authentication, DNS-BL, Email How To, Email Security, Macros, Cybersecurity, MDaemon Email Server, Security Gateway for Email, Spear Phishing, Email Spoofing, Anti-Virus, Backscatter, Phishing, Email Best Practices, Passwords
As cyber threats evolve, we face growing email security challenges. Hackers and cyber criminals relentlessly continue to attack businesses as users continue to fall for email scams. That’s why we must continue to be aware of the best practices for securing our email.
How MSPs Can Have Greater Control Over Secure Email Gateways
By Kevin Beatty posted in Cloud, Data Leak Prevention, Email Security, Cybersecurity, Anti-Spoofing, Security Gateway for Email, Stop Spam Email, Anti-Virus, Email Server, External Email Threats, internal email threat, msp
Beyond Hackers: Identify and Mitigate Insider Threats to Your Data
By Brad Wyro posted in Data Leak Prevention, Email Security, Cybersecurity, Anti-Spoofing, Security Gateway for Email, Spear Phishing, Email Spoofing, Phishing, insider threats
Jean Patrice Delia was an engineer at GE when he decided to steal company data and use trade secrets, pricing information, marketing data, and other documents and funnel them to his business partner to compete against GE. After an FBI investigation, Delia was arrested and sentenced to two years in prison and ordered to pay $1.4 million in restitution. His business partner, Miguel Sernas, spent nearly a year in jail and was also ordered to pay $1.4 million.
Users Love SecurityGateway™ for Email Servers in G2's Winter Reports
By Kevin Beatty posted in Data Leak Prevention, Email Security, Cybersecurity, Anti-Spoofing, Security Gateway for Email, Anti-Virus
G2 just released their Winter 2022 badges, and SecurityGateway™ for Email Servers continues to rank at the top of the Secure Email Gateway Software category.
Decoding Today’s Healthcare Phishing Attempt
By Brad Wyro posted in Email Gateway How-To, Email Security, Cybersecurity, MDaemon Email Server, Stop Spam Email, Email Spoofing, Phishing, Email Server
A brief glance through my spam folder in MDaemon Webmail recently reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. I’d like to be able to tell you that the recent crush of cyberattacks on the healthcare sector, as exacerbated by the COVID-19 pandemic, has run its course – but then I’d be the one scamming. Looking through the latest Health IT Security monthly news archive turns up a long litany of phishing, ransomware, malware, spoofing, password theft and other data leaks, and server vulnerabilities that affect millions of patients and financial donors – and it’s not even the end of the month.
Don't Become a Victim of Common Email Scams in Healthcare
By Brad Wyro posted in Business Email Compromise, Email Security, Cybersecurity, Stop Spam Email, Phishing, Health Care Security
It's just a fact of life: If there's email, there will always be spam. If you’re involved with email security for a healthcare organization, 2020 is absolutely the year you can’t afford not to take this seriously. The healthcare sector has become a major target for cyberattacks during the COVID-19 pandemic, and these attacks are successful so often that Becker’s Hospital Review publishes a monthly update on healthcare provider malware, ransomware and phishing incidents. The most recent list includes:
10 Tips to Help Healthcare Employees Identify a Phishing Email
By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Health Care Security
Whether you run a multi-campus medical center or a small private practice, you’ve likely heard about cyber criminals who try to trick you and your employees into clicking a link or downloading an attachment so they can steal your organization’s money or protected data.
How To Protect Your Email from Cyber Threats
By Brad Wyro posted in Email Gateway How-To, Email Privacy, Cybersecurity, Two-Factor Authentication, Email Best Practices
We live in an era where the amount of valuable data businesses must store is increasing at an unprecedented pace. Consequently, the number of cyber criminals trying to gain access to that data is also increasing. In fact, according to a report released last year by Osterman Research, 81% of organizations have been the victim of some type of data breach, targeted email attack, successful phishing attack or other cyber security incident during the previous 12 months. And with the surge of people working from home due to the COVID-19 pandemic, these numbers are only going to go up.