Phishing Prevention Technology: Why Aren’t Municipalities Onboard?

Phishing Prevention Technology: Why Aren’t Municipalities Onboard?

If you haven’t heard lately, when it comes to getting phished, municipalities and local governments aren’t doing too well. And it’s costing them a lot of money.

According to a recent article on SC Magazine website, four different municipalities were hit with ransomware attacks during the week of April 15, 2019. The article said, “Augusta, Maine; Imperial County, Calif.; Stuart, Fla.; and Greenville, N.C. were all in different stages of recovering from ransomware attacks over the last seven days.”

(more…)

Is Your Hosted SMTP Naked?

Is Your Hosted SMTP Naked?

SMTP service (i.e., email) today is a commodity. So much so, that many businesses pay some other business to “host” their SMTP service for them. This enables the business to send and receive email without having to buy, set up or manage an SMTP server. And judging by how prices have come down over time, it’s fair to assume that there are a lot of hosted SMTP service providers.

(more…)

Easy Office 365 Tenant Migrations

Easy Office 365 Tenant Migrations

We regularly help businesses migrate from one Office 365 to another Office 365 tenant. A verycommon use case involves the transition between (or within) email providers or splitting out business units or the migration of tenants between organizations. Microsoft warns that a new Office 365 tenant may be inaccessible for as long as 24 hours during the migration, which means there is a chance for email to be lost. Microsoft’s guide to migrating email accounts between Office365 tenants includes the following instruction:

(more…)

If Your Email Server Stops Accepting Emails How Long Will it Take You to Find Out?

If Your Email Server Stops Accepting Emails How Long Will it Take You to Find Out?

Servers go down. And when they do it can negatively impact your business, from lost productivity to lost customers. You don’t want that to happen. Monitoring email is not as simple as checking to see if the port responds, you have to validate that the entire mail flow is functioning. So, how do you find out that your email server is down and not accepting emails or just taking too long to respond? More importantly, how long does it take for you to discover it? Minutes? Hours?

(more…)

Top Phishing Targets by Industry: 2019 Edition

Top Phishing Targets by Industry: 2019 Edition

Phishing attacks are becoming more prevalent across almost all industries worldwide. But some industries are targeted more frequently than others.

Email fraud remains one of the most common ways cybercriminals gain unauthorized access to their victims’ IT systems. Now, however, cybercriminals are beginning to expand their attacks to include more sophisticated tactics that rely on email, social media, and even victims’ mobile devices. You need more than email security to protect yourself against phishing.

(more…)

Microsoft Office 365: A Phishing Attack Waiting to Happen

Microsoft Office 365: A Phishing Attack Waiting to Happen

There are a lot of benefits to using Microsoft Office 365. It contains business tools with which you’re already familiar. It’s easy to set up and offers anytime, anywhere access.

You’ll see many of these features and benefits promoted on the Office 365 website. Won’t you want to see there among the list though is that using Office 365 makes you extremely vulnerable to a phishing attack. Why is that?

(more…)

There’s Nothing Sexy About Sextortion

There’s Nothing Sexy About Sextortion

There was a time when hackers and email scammers used spear phishing to trick their victims into sending money. By the time someone figured what had happened, the money was gone forever. But, people are starting to get wise to that tactic. So, what do the hackers do? They evolve…all the way to blackmail.

(more…)

5 Ways You Protect Your Business From Ransomware

5 Ways You Protect Your Business From Ransomware

Cybercrime is one of the most prevalent and growing threats that organizations face today. Malware, and particularly ransomware, can cost companies millions of dollars and heavily impact user confidence. When the city of Atlanta found itself victimized by a ransomware attack, it ended up signing eight emergency contracts – and spending a total of $2.6 million – to control the damage.

(more…)

[News] If Cybersecurity Professionals Can Get Phished

[News] If Cybersecurity Professionals Can Get Phished

Defense Contractors Get Taken in by Business Email Compromise

Business email compromise (BEC) is a form of email fraud that typically involves targeting employees with access to company finances and using social engineering to trick them into making money transfers to the bank accounts of the fraudster. According to an article on security website Cyberscoop, scammers used BEC to steal more than $150,000 from two defense contractors last year.

(more…)

Phishing in the News

Phishing in the News

If You Think Phishing Is Only Your Employer’s Problem Think Again

If you work for a company, you probably think about phishing attacks in a distant sort of way. In other words, phishing may be a problem, but it’s not your problem, really. It’s your employers’. Right? Wrong.

(more…)

Pin It on Pinterest