Easy Office 365 Tenant Migrations

We regularly help businesses migrate from one Office 365 to another Office 365 tenant. A verycommon use case involves the transition between (or within) email providers or splitting out business units or the migration of tenants between organizations. Microsoft warns that a new Office 365 tenant may be inaccessible for as long as 24 hours during the migration, which means there is a chance for email to be lost. Microsoft’s guide to migrating email accounts between Office365 tenants includes the following instruction:

Change your primary MX record from Office 365 to domain that is not reachable, i.e. “unreachable.example.com”. Internet mail servers attempting to deliver new mail will queue the mail and attempt redelivery for 24 hours. Using this method, some email may return a non-delivery report (NDR) depending on the server attempting to deliver the email. If this is a problem use an MX record backup service. There are many third party services that will queue your email for days or weeks. Once your migration is complete, these services will deliver the queued mail to your new Office 365 tenant.

If non-delivered email is unacceptable, our backup MX service can be employed to temporarily queue all emails during the tenant transitions – we can queue your email while your tenant is migrated with geographic redundancy, technical support and expert guidance for $200 for the migration. Take a look at https://www.tenantmigration.com/ for additional information

 

If Your Email Server Stops Accepting Emails How Long Will it Take You to Find Out?

If Your Email Server Stops Accepting Emails How Long Will it Take You to Find Out?

Servers go down. And when they do it can negatively impact your business, from lost productivity to lost customers. You don’t want that to happen. Monitoring email is not as simple as checking to see if the port responds, you have to validate that the entire mail flow is functioning. So, how do you find out that your email server is down and not accepting emails or just taking too long to respond? More importantly, how long does it take for you to discover it? Minutes? Hours?

Continue reading “If Your Email Server Stops Accepting Emails How Long Will it Take You to Find Out?” »

Top Phishing Targets by Industry: 2019 Edition

Top Phishing Targets by Industry: 2019 Edition

Phishing attacks are becoming more prevalent across almost all industries worldwide. But some industries are targeted more frequently than others.

Email fraud remains one of the most common ways cybercriminals gain unauthorized access to their victims’ IT systems. Now, however, cybercriminals are beginning to expand their attacks to include more sophisticated tactics that rely on email, social media, and even victims’ mobile devices. You need more than email security to protect yourself against phishing.

Continue reading “Top Phishing Targets by Industry: 2019 Edition” »

Microsoft Office 365: A Phishing Attack Waiting to Happen

Microsoft Office 365: A Phishing Attack Waiting to Happen

There are a lot of benefits to using Microsoft Office 365. It contains business tools with which you’re already familiar. It’s easy to set up and offers anytime, anywhere access.

You’ll see many of these features and benefits promoted on the Office 365 website. Won’t you want to see there among the list though is that using Office 365 makes you extremely vulnerable to a phishing attack. Why is that?

Continue reading “Microsoft Office 365: A Phishing Attack Waiting to Happen” »

5 Ways You Protect Your Business From Ransomware

5 Ways You Protect Your Business From Ransomware

Cybercrime is one of the most prevalent and growing threats that organizations face today. Malware, and particularly ransomware, can cost companies millions of dollars and heavily impact user confidence. When the city of Atlanta found itself victimized by a ransomware attack, it ended up signing eight emergency contracts – and spending a total of $2.6 million – to control the damage.

Continue reading “5 Ways You Protect Your Business From Ransomware” »

[News] If Cybersecurity Professionals Can Get Phished

[News] If Cybersecurity Professionals Can Get Phished

Defense Contractors Get Taken in by Business Email Compromise

Business email compromise (BEC) is a form of email fraud that typically involves targeting employees with access to company finances and using social engineering to trick them into making money transfers to the bank accounts of the fraudster. According to an article on security website Cyberscoop, scammers used BEC to steal more than $150,000 from two defense contractors last year.

Continue reading “[News] If Cybersecurity Professionals Can Get Phished” »

DuoCircle Sponsoring Open Certificate Authority Let’s Encrypt for a Second Year

Duocircle, a web-based email security solutions company, has chosen to sponsor Let’s Encrypt for the second year in a row. Let’s Encrypt is a service provided by the non-profit Internet Security Research Group. Let’s Encrypt gives people free digital certificates because they want to create a more secure and privacy-respecting web.

Continue reading “DuoCircle Sponsoring Open Certificate Authority Let’s Encrypt for a Second Year” »

10 Reasons Why Your Business Needs a Hosted Email Archiving Solution

10 Reasons Why Your Business Needs a Hosted Email Archiving Solution

There are 3.8 billion email accounts worldwide, and 281 billion emails were sent per day in 2018. Chances are, your business has contributed a bit to that number.

After a while, the accumulated emails can get unruly, not to mention become problematic as well. To solve those problems, you should consider email archiving.

Here are 10 reasons why a hosted email archiving solution can benefit your business.

Continue reading “10 Reasons Why Your Business Needs a Hosted Email Archiving Solution” »

The Latest Phishing Trends Traced to Russia

The Latest Phishing Trends Traced to Russia

Russia and its hackers have been popular in the news for the past several years. Whether to allegedly influence foreign elections or steal intellectual property its sphere of influence is worldwide.

But first a bit of history.

How did we get to this point in time? Countries have always been involved with clandestine activities to undermine or even overthrow neighboring governments. They have used deception and sometimes even force to accomplish their goals. So it was only a matter of time before technology was embraced as a tool to this end. And so began the partnership between hacker and government.

Continue reading “The Latest Phishing Trends Traced to Russia” »

Spear Phishing Prevention for Small and Medium Size Businesses

Spear Phishing Prevention for Small and Medium Size Businesses

What is spear phishing?

Spear phishing is when you receive an email from someone or some company you trust. It looks legitimate. It may even have the names and extension number of coworkers. It looks authentic, so you don’t give it a second thought. But you should, because it’s from an attacker, and they’re trying to steal your valuable information. Do you have reliable email phishing prevention security?

Continue reading “Spear Phishing Prevention for Small and Medium Size Businesses” »

Pin It on Pinterest