2024 has been a year marked by significant advancements in the tactics of cybercriminals and the defenses of cybersecurity professionals.
2024 Year in Review: Email Security Trends, New Feature Updates and More
By Brad Wyro posted in Product Updates, Update, Email Security Trends
MDaemon Technologies Helps Specialty Retailer “Fix It and Forget It”
By Brad Wyro posted in Email Security, Security Gateway for Email, Email Security Trends
As a small business, what do you do when the big players in a mission-critical industry such as email don’t meet your business’ needs? You find a cost-effective, easy-to-use solution with great customer service – the kind developed by an industry expert. That’s how MDaemon Technologies came to be the email security provider for one specialty retailer in Texas.
Four-Step Swindle: The Anatomy of a Business Email Compromise Attack
By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Phishing, Email Security Trends
This week, we continue our series on Business Email Compromise. Click here to read Part 1, which includes an overview and various statistics on this growing threat.
Alt-N Technologies is Renamed MDaemon Technologies
By Brad Wyro posted in MDaemon Email Server, Security Gateway for Email, Email Server, Email Security Trends
New Name to Leverage Global Brand Equity of Company’s Flagship Email Server
Grapevine, TX (USA) – January 2, 2018 – Alt-N Technologies announced today that, effective immediately, the Company’s legal name will be MDaemon Technologies, and that it will begin doing business under the new company name.
Steps to Track Spam Sent Out From a Local Machine on Your Network
By Brad Wyro posted in Email Gateway How-To, Email How To, Email Security, Cybersecurity, Stop Spam Email, Tutorial, Email Security Trends
Has this happened to you? Let’s say you’re the MDaemon administrator for your company, and you’ve noticed that somewhere, somehow, spam messages are being sent from within your network. Perhaps one of your PCs has been compromised. What do you do? Here are some tips to help you track the issue down.
Easy Backup & Recovery with MDaemon
By Brad Wyro posted in Email How To, Email Management, MDaemon Email Server, Email Server, Email Security Trends
MDaemon's user-friendly flat-file structure makes it easy to backup and recover your email messages, user accounts, security settings, and any other data stored in MDaemon. No extra Windows components or third-party applications are required, and you won't have to navigate through any confusing dialog boxes to backup & recover your data. Backing up and restoring MDaemon is as easy as drag & drop. All you would need to do is map a drive letter from the MDaemon server to another drive on your network, then drag over the files you want to back up.
Follow These 13 Tips to Avoid Being Blacklisted
By Brad Wyro posted in Email Security, Two-Factor Authentication, Email Security Trends, Email Best Practices
With the prevalence of spam circulating the globe in massive amounts, it becomes increasingly important for administrators to understand the potential causes of their IP address ending up on a blacklist. Spammers employ all kinds of tricks to try to send out as many spam messages as possible without revealing their identities. They do this through various techniques such as social engineering, employing malware, botnets, forging of message headers, and exploiting weaknesses in email systems or network infrastructures. For the spammer, it’s basically a numbers game. It costs next to nothing to send out thousands of spam messages, and if even a small handful of people click on a link or purchase a product advertised in a spam message, the spammer can profit.
If your email infrastructure is not properly secured, then you risk being infected with malware and becoming part of a spam botnet. Even if your server is not infected with malware, if your firewall and mail server security settings are not configured properly, your IP address could wind up on a blacklist. To protect yourself from being blacklisted, consider the following recommendations:
SSL & TLS Best Practices
By Brad Wyro posted in Email Security, Email Encryption, Email Security Best Practices, Two-Factor Authentication, Email Security Trends, Email Best Practices
You may have heard the terms SSL and TLS, but do you know what they are and how they’re different?