What is data privacy and how it impacts your organization’s email
Billions of emails are sent every day, many of which contain sensitive data. This sensitive data is often like low-hanging fruit for cybercriminals and disgruntled employees. The ease in which personally identifiable information PII is exploited demonstrates why ensuring data privacy is the concern of every business. (more…)
Cybercriminals know your inbox is far from secure.
Cybercrime is bigger business than you might realize. In today’s cybersecurity environment, keeping corporate data safe requires more than just teaching employees to look out for suspicious emails. You need to be proactive in creating and maintaining a tight perimeter defense around your key processes and treat every IT position in your company as a cybersecurity position. (more…)
Last year was a rough year for malware and phishing. 2017 kicked off with hacking and malware infections making news in early January when an effective phishing scam targeted Google Gmail users by tricking them into sharing their login credentials. And now as we close out the year, these types of brazen frauds have not slowed down, in fact it has gotten worse. (more…)
How email-based ransomware works and how to prevent attacks
Ransomware has become the largest, most dangerous malware threat to date. It affects individuals, businesses, and governments around the world by holding hard drive data hostage. The cost of ransomware infections was projected to exceed US$5 billion by the end of this year, according to this report from Cybersecurity Ventures. Costs go far beyond dealing directly with a ransomware attack. In many cases, organizations had to reduce or cease operations until the ransomware was removed. Lost business, damage to reputation, and lawsuits further added to the burden of cost for businesses that fell victim to ransomware attacks. (more…)
How Blacklisted IPs Destroy A Business and its Clients
Just under 57% of global email traffic is spam, according to this 2017 Statista report. With a daily volume of 269 billion emails sent, it’s obvious that roughly 153 billion of those emails need to be stopped from being sent out. We think about spam as a mere annoyance, something that can mostly be left for someone else to deal with. However, spam is a lot more dangerous than that. If your email server’s IP is blacklisted, your entire business and your customers are at risk. So, what exactly is a blacklisted IP address and how will it affect your business? (more…)
We are officially releasing the new branding for our hosted email service which was part of the Nettica acquisition three years ago. All customers have been safely transitioned to the new platform where we offer a huge array of new features for business branded email hosting. The old platform served us very well and grew our hosted email service to tens of thousands of customers but it did not offer some of the more scalable features that we needed to keep your email spam free and secure. (more…)
Advanced Threat Defense to Protect Your Business from Phishing Scams
Phishing scams are more common than you might think. In fact, a typical user at business receives an average of six malicious emails per day ranging from innocuous to dangerous. Most time these threats are caught by the spam filter, but spam filtering alone is not always effective because between 2013 and 2016, American businesses faced a staggering $500 billion in losses due to phishing scams. This led to an extensive FBI investigation of over 22,000 reported phishing scams, and these are just the ones that people took time to report.
Our new Smart Quarantine product and released a new version of Smart Quarantine with some improvements. The new version is ever smarter to save you even more time.
A comparison of business features and pricing. How Do I Choose the Right Productivity Suite for My Business?
We have a bottom line up front approach to our writing. We don’t want to save the best until last, we put it right up front and then provide you the reasoning behind our choice. However to make a good decision, it’s important to ask multiple questions about your business and how you plan to use the productivity suite. (more…)
Today we are rolling out a much anticipated new feature to help manage and monitor your email flow more effectively, Proactive Queue Notifications.
The Proactive Queue Notifications system sends an email to the domain administrator when we detect messages that have not been delivered to your servers within a predefined threshold. These notifications will provide you with information on how to remedy the alert and will be sent to both the primary and secondary email addresses that are configured in your client portal https://portal.duocircle.com/clientarea.php?action=details (more…)
So you’ve been thinking about switching your email away from your current hosted email provider and you are probably considering the two biggest competitors in the hosted email and collaboration space G Suite or Office 365.
If you read our previous blog about G Suite and the Enterprise you know that G Suite is usually our go-to productivity suite for smaller offices and those who are ready for a web first approach to email and collaboration. (more…)
Google is aiming directly at Microsoft Office 365 with its latest product, G Suite (formerly Google Apps for Work). Earlier this year, Google announced a milestone in the number of businesses that use G Suite:
“G Suite achieved a significant new customer milestone last quarter,” he said. “More than 3 million paying businesses are now using G Suite to collaborate smartly and securely in the cloud.”
The need for end-to-end organizational security is greater than ever. People throughout organizations are often working outside of the office, using personal mobile devices and home computers to access corporate apps, networks, and assets. Just head to a Starbucks or Coffee Shop during the week day and see the number of users working remotely. The challenge is that personal devices and home computers introduce security challenges that aren’t always easily resolved. (more…)
Incident Summary Due to a system outage on Tuesday June Jun 20, 2017 – 13:11 PDT, Major Outage requiring all Nettica hosted email customers be migrated to the new DuoCircle hosted email platform. Timeline as we became aware…
I just ran across this site Phishing Site in our spam quarantine folder, the sender had targetted a few thousand users on the system over the course of a few days. The thing that I found most interesting about this particular Phishing site is what I like to call the nibble.
Incident Summary Due to a system outage on Wednesday May 17 20:08 UTC, 30 minutes of email needed to be re-delivered to your mail server.
Timeline
We became aware of a system delivery issue because our delivery checks from MXToolbox failed and then alerted us within two minutes of the issue starting. Engineering was staff responded immediately, there was no delay between notification and the time we started investigating. (more…)
Did you receive a phishing email today from google with a document request from a friend? A user on reddit.com did and this is what he went through to figure it out.
You need to prepare yourself with the knowledge and understanding of just how important this attack vector is in context and how it is now going to be the model for NEW email-centric attacks. (more…)
Email archiving does not need to be bewildering nor complex, despite how it has been perceived in the past. While email archiving has evolved into a complicated system of business governance and regulatory compliance requirements, the direct benefit to small businesses is that these requirements have spurred the development of sophisticated (yet easy to use) archiving solutions that meet the all the key business requirements. You may have the perspective as a small business owner that your current email retention and archiving is sufficient, taking the view that, if it ain’t broke, don’t fix it. However, this perspective misses the point. The way you have been doing things is not necessarily the best practice going forward. (more…)
Co-working SpaceTeam fund big data prototype prototype long shadow latte big data. Innovate affordances personas user centered design paradigm user centered design innovate quantitative vs. qualitative pivot thought leader viral paradigm cortado affordances.