Alumni Email Forwarding Service

Alumni Email Forwarding Service

One of the things that we have noticed in the last few years is that the migration to the cloud has created a huge gap created by the migration to the cloud by Universities and Colleges. While Office 365 or Google Apps are attractive options of hosting current students and faculty and staff, they are not a good fit to handle the unique needs for alumni email forwarding.

 

Alumni email forwarding

 

(more…)

What is Backup MX, and What Should You Look For?

What is Backup MX, and What Should You Look For?

Despite the rise of tools like Slack, Skype or Jabber the reality is that nearly all business communication between companies is over email. When your mail server is compromised and goes offline, not only internal communications will be disrupted, but external ones as well. Sales inquiries, customer service requests, and important inter-business communication channels will be cut off, and inbound emails will bounce, causing potentially significant disruption and potential loss of revenue.

(more…)

Yahoo DMARC Update 2016

Yahoo DMARC Update 2016

You may already know that Yahoo.com has a DMARC policy in place that prevents mail with yahoo.com in the from address from being delivered if it is sent from outside Yahoo’s infrastructure.

Yahoo is expanding this policy to their lower-volume Yahoo international domains below on Mar 28, 2016.

The list of domains that will become unusable is as follows:

(more…)

Outbound Spam Protection Policy Change

Outbound Spam Protection Policy Change

We often write about preventing spam from getting into your mailbox, (as you know Spam Filtering is one of our most popular products), however we really don’t stop to talk about the problem of SMTP service providers inadvertently allowing their customers to send out what would be considered by the recipient to be SPAM or outbound spam protection.The tools, techniques, and mitigation required to defend an inbox are very well established and documented. But preventing authenticated, paying customers from abusing your network to send spam intentionally or because of a compromised system is an issue that we are attacking head-on.

(more…)

Ransomware Attacks Your Organization’s Ability to Function

Ransomware Attacks Your Organization’s Ability to Function

By the time any business is aware that they are the target of a ransomware attack, it’s too late. Once a hacker has breached security and enticed a user to click on a malicious link or attachment, access to local data on that employee’s computer is locked. In order to unlock the data, a ransom must be paid. In about 91% of cases, the vector for ransomware is incoming email, often in the form of a spear phishing attack that purports to be from a sender known and trusted by the victim.

(more…)

Effective Spam Blocking is Vital to Your Organization

Effective Spam Blocking is Vital to Your Organization

Spam is one of the most ubiquitous and costly annoyances to companies today. It clogs inboxes. It consumes storage space and bogs down email servers. And it consumes tremendous amounts of bandwidth with frivolous or dangerous messages and traffic. With the yearly increase in the volume of spam, finding the right spam blocking solution is vitally important to business, because without effective spam blocking, productivity can and will grind to a halt.

(more…)

Validating To: and From: Addresses

Validating To: and From: Addresses

We are making two new changes to the way that the email system processes mail in an attempt to cut down on spam. We are adding additional validations and checks to ensure that the domains mentioned in the SMTP envelope are valid and have a functional DNS record.
(more…)

Cloud-Based Spam Filtering Protects Your Company

Cloud-Based Spam Filtering Protects Your Company

 

Each year, an increasing number of spam emails are sent to corporate employees, threatening to clog corporate email servers and slow productivity to a crawl. With the rising concern to business that spam has created, more organizations are turning to cloud-based spam filtering solutions to ameliorate the threat of disruption from spam.

(more…)

The Top Three Email Based Threats And How To Avoid Them

The Top Three Email Based Threats And How To Avoid Them

Email threats come in a variety of forms. With over 90% of security threats beginning with some form of email attack, it is imperative that organizations educate their users on these forms of attack, get better email hosting and take steps to harden their networks against them. Three of the most commonly seen broad categories of email threat are Phishing, Ransomware, and Domain Name Spoofing.

(more…)

The Threat Of Ransomware is Real

The Threat Of Ransomware is Real

Ransomware is a multi-million dollar a year online business that can strike any organization.

Both Ransomware and legitimate business engage in email marketing campaigns with the intent of making sales to new customers. In the case of legitimate business, some good or service of value is returned to the client. In the case of ransomware, business is slowed or halted by malware that locks or deletes files, and a ransom is demanded that may or may not stop the attack or reverse the damage if paid. Ransomware is criminal but make no mistakes: its top producers make millions of dollars a year in revenue.

(more…)

Superior Email Security is the Key to Stopping Ransomware

Superior Email Security is the Key to Stopping Ransomware

The number of ransomware attacks is increasing worldwide, which forces corporate IT teams to come up with innovative solutions to combat the threat.

But email based threats like ransomware are costly and difficult to fight with on-site solutions alone. With an on-site solution, by the time the existence of ransomware is known, the threat is already wreaking havoc across the network.

Once ransomware gains access to a company’s systems, it’s too late. In the best cases, only a few isolated computers are held hostage. But if shared network drives are present, the ransomware can propagate across entire corporate networks, quickly bringing the organization to its knees.

(more…)

Effective Spam Filtering Protects Your Employees

Effective Spam Filtering Protects Your Employees

Spam is more than just an annoyance, and effective spam filtering is a critical part of any IT security plan. Each day, corporate email servers are inundated with a vast amount of spam. To combat this rising tide, organizations need sophisticated spam filtering. When proper spam filtering is in place, employee inboxes are kept free of unwanted messages, and unwanted traffic stays off the network.

(more…)

Office 365 Is A Fantastic Tool, But…

Office 365 Is A Fantastic Tool, But…

Microsoft® Office 365™ is a fantastic choice for companies that want to implement a cloud-based email solution.

Unfortunately, however, the out-of-the-box email archiving solution provided by Office 365 doesn’t meet the stringent security requirements or give the functionality that most organizations expect and demand. These functions include limitations on the number of saved searches, the total volume of messages stored in the archive and ALL users, not just active users are billed at the full rate.

(more…)

The Threat Of Phishing Email Attack Is Serious

The Threat Of Phishing Email Attack Is Serious

A phishing attack takes advantage of the user’s trust by impersonating an email from a friend, associate, well known business contact or senior management.

The user is tricked into sharing login credentials, account information, personal or corporate data, or other sensitive information. Often, the user is asked to click on a link to a site that looks exactly like the real thing: online banking site spoofs are common, as are paypal, google login pages or almost any cloud service.

(more…)

Are You Ready To Meet The Threat Of Locky Ransomware?

Are You Ready To Meet The Threat Of Locky Ransomware?

Locky is a ransomware variant that was first reported in 2016.

The most common version of the attack arrives as an attachment to an email. When opened, the attachment is mostly unreadable, except for a direction to the user to enable macros in order to make the content readable. If this is done however, an embedded macro in the “message” runs and saves the Locky virus to the user’s hard drive. After that, typically any Microsoft Office files, videos, and images on the hard drive are encrypted through the office 365 phishing email.

(more…)

Pin It on Pinterest