Phishing Attacks: The State of the Art

Phishing Attacks: The State of the Art

It’s why awareness training will never be good enough. And it’s why the best phishing protection technology may always fall a little short. The truth is, some of the best and brightest minds around are using their smarts to come up with more clever and more undetectable phishing exploits. It’s a technological arms race, and maybe the best you can ever hope for is a tie.

Continue reading “Phishing Attacks: The State of the Art” »

Remote Vulnerability Affecting Over 50% of Mail Servers

A remote vulnerability has been discovered in the EXIM email server that allows an attacker to run commands as root.

https://www.zdnet.com/article/new-rce-vulnerability-impacts-nearly-half-of-the-internets-email-servers/

If your mail server is running EXIM our email gateway can offer you complete protection from this exploit and can keep your users safe. The service is cloud-deployed and fully managed and can scale from a single domain to hosting providers needing filtering for tens of thousands of domains.

 

 

Why Most Phishing Prevention Advice Falls Short

Why Most Phishing Prevention Advice Falls Short

Phishing attacks are everywhere, and so is advice for how to prevent them. None of the advice offered is wrong, it’s just woefully incomplete.

A recent article on the Security Week website, Business Email Compromise Still Reigns, discusses the FBI’s annual Internet Crime Complaints Center (IC3) report and why business email compromise (BEC)—a type a phishing attack—is so prevalent.

Continue reading “Why Most Phishing Prevention Advice Falls Short” »

Just When You Thought Taxpayer Phishing Season Was Over

Just When You Thought Taxpayer Phishing Season Was Over

It’s not surprising that hackers use W-2 phishing scams during tax season. Taking advantage of topical and popular subjects is at the heart of social engineering. But, the W-2 scams don’t usually target taxpayers.

According to the article on CSO Online, “The W-2 scam tries to take advantage of folks in accounting, controller and HR roles by presenting urgent

Continue reading “Just When You Thought Taxpayer Phishing Season Was Over” »

How One Successful Phishing Attack Lead to Forced Early Retirement

How One Successful Phishing Attack Lead to Forced Early Retirement

If you ever find yourself the victim of a phishing attack and ransomware, you’ll only have a few options to try and deal with your circumstances.

Today, successful ransomware attacks involve stolen or encrypting the victim’s data. And to get it back, you have to pay the ransom. Of course, paying the ransom is no guarantee that you’ll get your data back, but it’s certainly higher than not paying it.

Continue reading “How One Successful Phishing Attack Lead to Forced Early Retirement” »

Seriously? Over 1 Billion Records Leaked in One Month

Seriously? Over 1 Billion Records Leaked in One Month

That’s more than 30% of people on the planet with internet access. In one month! All of that during April 2019, bringing the annual total to 5.64 billion. I wonder what will happen in May.

An article on IT Governance Blog details all of the cyber-attacks, ransomware, data breaches and financial information that was compromised during the most recent month. There’s over 70 in the list including 25 healthcare providers and 19 schools and government agencies. I doubt the list is complete.
Continue reading “Seriously? Over 1 Billion Records Leaked in One Month” »

Game of Thrones Phishing Scams: What Do You Need To  Know?

Game of Thrones Phishing Scams: What Do You Need To Know?

The last season of Game of Thrones (GoT) is finally on air, and everyone seems to be excited about it! GoT is one of the most successful shows ever to be shown on TV. However, the massive popularity of the show has lead to cybercriminals exploiting people’s love for it by tricking individuals into various online scams, and many people have lost their hard earned money by fraudulent emails in circulation nowadays.

Continue reading “Game of Thrones Phishing Scams: What Do You Need To Know?” »

Phishing Prevention Technology: Why Aren’t Municipalities Onboard?

Phishing Prevention Technology: Why Aren’t Municipalities Onboard?

If you haven’t heard lately, when it comes to getting phished, municipalities and local governments aren’t doing too well. And it’s costing them a lot of money.

According to a recent article on SC Magazine website, four different municipalities were hit with ransomware attacks during the week of April 15, 2019. The article said, “Augusta, Maine; Imperial County, Calif.; Stuart, Fla.; and Greenville, N.C. were all in different stages of recovering from ransomware attacks over the last seven days.”

Continue reading “Phishing Prevention Technology: Why Aren’t Municipalities Onboard?” »

Is Your Hosted SMTP Naked?

Is Your Hosted SMTP Naked?

SMTP service (i.e., email) today is a commodity. So much so, that many businesses pay some other business to “host” their SMTP service for them. This enables the business to send and receive email without having to buy, set up or manage an SMTP server. And judging by how prices have come down over time, it’s fair to assume that there are a lot of hosted SMTP service providers.

Continue reading “Is Your Hosted SMTP Naked?” »

Easy Office 365 Tenant Migrations

Easy Office 365 Tenant Migrations

We regularly help businesses migrate from one Office 365 to another Office 365 tenant. A verycommon use case involves the transition between (or within) email providers or splitting out business units or the migration of tenants between organizations. Microsoft warns that a new Office 365 tenant may be inaccessible for as long as 24 hours during the migration, which means there is a chance for email to be lost. Microsoft’s guide to migrating email accounts between Office365 tenants includes the following instruction:

Continue reading “Easy Office 365 Tenant Migrations” »

If Your Email Server Stops Accepting Emails How Long Will it Take You to Find Out?

If Your Email Server Stops Accepting Emails How Long Will it Take You to Find Out?

Servers go down. And when they do it can negatively impact your business, from lost productivity to lost customers. You don’t want that to happen. Monitoring email is not as simple as checking to see if the port responds, you have to validate that the entire mail flow is functioning. So, how do you find out that your email server is down and not accepting emails or just taking too long to respond? More importantly, how long does it take for you to discover it? Minutes? Hours?

Continue reading “If Your Email Server Stops Accepting Emails How Long Will it Take You to Find Out?” »

Pin It on Pinterest