MDaemon Technologies Blog

Email Scams to Watch Out For During the Holiday Season

By Brad Wyro posted in Cybersecurity, Phishing, Email Security Best Practices, Email Best Practices

0 Comments

The holiday season is a prime time for email scammers to strike. Learn how to identify and protect yourself from fraudulent emails that could ruin your festive spirit.

Read More

Watch out for election season phishing and social engineering attacks

By Brad Wyro posted in Email Security, Phishing, Email Security Best Practices, Email Best Practices

0 Comments

The 2024 presidential election is well under way in the United States, and that means cybercriminals are exploiting heightened public interest and uncertainty to launch targeted attacks using phishing and social engineering tactics. Here’s how they typically do it:

Read More

Protect Yourself from IRS Tax Filing Phishing Scams

By Brad Wyro posted in Phishing, Email Security Best Practices, tax scams

0 Comments

The April 15 tax filing deadline is approaching. Learn how to safeguard yourself from IRS tax filing phishing scams that can compromise your personal information and financial security.

Read More

Stay One Step Ahead: Anti-Phishing Best Practices for Your Business

By Brad Wyro posted in Email Security, Phishing, Email Security Best Practices, Email Best Practices

1 Comment

Protect your business from phishing attacks with these essential best practices. Stay one step ahead of cybercriminals and safeguard your sensitive data.

Read More

Unveiling Pretexting: The New Face of Phishing

By Brad Wyro posted in Email Security, Phishing

0 Comments

Discover the latest technique cybercriminals use to deceive victims and gain unauthorized access to sensitive information.

Read More

Top 9 Email Security Tips to Protect Against Spam, Phishing & Malware

By Brad Wyro posted in Anti-Relay, Attachments, Bayesian Learning, Content Filter, Data Leak Prevention, Email Authentication, DNS-BL, Email How To, Email Security, Macros, Cybersecurity, MDaemon Email Server, Security Gateway for Email, Spear Phishing, Email Spoofing, Anti-Virus, Backscatter, Phishing, Email Best Practices, Passwords

0 Comments

As cyber threats evolve, we face growing email security challenges. Hackers and cyber criminals relentlessly continue to attack businesses as users continue to fall for email scams. That’s why we must continue to be aware of the best practices for securing our email.

Read More

Beyond Hackers: Identify and Mitigate Insider Threats to Your Data

By Brad Wyro posted in Data Leak Prevention, Email Security, Cybersecurity, Anti-Spoofing, Security Gateway for Email, Spear Phishing, Email Spoofing, Phishing, insider threats

0 Comments

Jean Patrice Delia was an engineer at GE when he decided to steal company data and use trade secrets, pricing information, marketing data, and other documents and funnel them to his business partner to compete against GE. After an FBI investigation, Delia was arrested and sentenced to two years in prison and ordered to pay $1.4 million in restitution. His business partner, Miguel Sernas, spent nearly a year in jail and was also ordered to pay $1.4 million. 

Read More

Business Email Compromise Scams are Reminder to Educate Users

By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Email Spoofing, Phishing

0 Comments

Online scams are nothing new -- but as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.

Read More

Decoding Today’s Healthcare Phishing Attempt

By Brad Wyro posted in Email Gateway How-To, Email Security, Cybersecurity, MDaemon Email Server, Stop Spam Email, Email Spoofing, Phishing, Email Server

0 Comments

 

A brief glance through my spam folder in MDaemon Webmail recently reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. I’d like to be able to tell you that the recent crush of cyberattacks on the healthcare sector, as exacerbated by the COVID-19 pandemic, has run its course – but then I’d be the one scamming. Looking through the latest Health IT Security monthly news archive turns up a long litany of phishing, ransomware, malware, spoofing, password theft and other data leaks, and server vulnerabilities that affect millions of patients and financial donors – and it’s not even the end of the month.

Read More

Got Employees Working From Home? How to Tighten Up Your Cyber Security

By Brad Wyro posted in Business Email Compromise, Data Leak Prevention, Email Privacy, Email Management, Phishing, Email Server

0 Comments

 

It’s OK, we understand. You thought you and your employees would all be safely back in the office by now. However, we’re all still adjusting to this new normal of exponentially more remote working – and exponentially more cyberattacks. Every day, hackers seek to exploit not only fear and insecurity caused by the pandemic, but the security loopholes created as more employees access their email and other work systems from remote devices. According to one report, streaming phishing sites saw an 85-percent increase from January to March, with more than 209 malicious websites being created every day. A record 25,000 confirmed phishing pages were created on March 19 alone!

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates