Outbound Spam Protection Policy Change

Outbound Spam Protection Policy Change

We often write about preventing spam from getting into your mailbox, (as you know Spam Filtering is one of our most popular products), however we really don’t stop to talk about the problem of SMTP service providers inadvertently allowing their customers to send out what would be considered by the recipient to be SPAM or outbound spam protection.The tools, techniques, and mitigation required to defend an inbox are very well established and documented. But preventing authenticated, paying customers from abusing your network to send spam intentionally or because of a compromised system is an issue that we are attacking head-on.

Continue reading “Outbound Spam Protection Policy Change” »

The Top Three Email Based Threats And How To Avoid Them

The Top Three Email Based Threats And How To Avoid Them

Email threats come in a variety of forms. With over 90% of security threats beginning with some form of email attack, it is imperative that organizations educate their users on these forms of attack and take steps to harden their networks against them. Three of the most commonly seen broad categories of email threat are Phishing, Ransomware, and Domain Name Spoofing.

Continue reading “The Top Three Email Based Threats And How To Avoid Them” »

Protecting Email in the Cloud – Challenges and Solutions

Protecting Email in the Cloud – Challenges and Solutions

Moving from a traditional on-site email server to a cloud-based solution is essential for businesses wishing to lower their costs of system management, IT resources and reducing the capital expenditures associated with an in office mail server.. The benefits of cloud-email  and systems are evident: near 100% uptime, no software upgrades or maintenance tasks for administrators and the latest features and innovations seamlessly deployed into your accounts. Continue reading “Protecting Email in the Cloud – Challenges and Solutions” »

Ransomware Attacks! Will You Be Ready?

Ransomware Attacks! Will You Be Ready?

Every day, organizations around the world are subjected to a ransomware attack. Ransomware attacks can take many forms, in fact, the variety and ingenuity of these attacks increases as the business community becomes more aware of the challenges and adept at meeting them. But all forms of ransomware follow the same basic pattern: an employee receives an email containing an attachment. Continue reading “Ransomware Attacks! Will You Be Ready?” »

DuoCircle Brings High Performance Enterprise Phishing Protection Services to Small Businesses on a Budget

DuoCircle Brings High Performance Enterprise Phishing Protection Services to Small Businesses on a Budget

DuoCircle LLC Announces Comprehensive Phishing Protection Services as a part of its new Advanced Threat Defense Suite: a cost-effective, multi-layered approach to controlling spam, malware and phishing attacks in corporate email. Continue reading “DuoCircle Brings High Performance Enterprise Phishing Protection Services to Small Businesses on a Budget” »

DuoCircle Sponsoring LetsEncrypt.org

DuoCircle Sponsoring LetsEncrypt.org

DuoCircle’s Advanced Threat Defense automatically generates SSL-certified domains for anti-phishing protection

At DuoCircle, we prioritize privacy and understand the need for encryption on the Web. We are passionate advocates for free speech, and the need to make encrypted connections ubiquitous online. We are happy to announce our sponsorship of Let’s Encrypt a market and thought leader in SSL and privacy online. While we are not a web hosting company that would benefit from issuing SSL certificates with each website we still believe in using the best of breed technology in all of our offerings. We specifically engineered our Advanced Threat Defense system for malware and phishing protection to utilize Let’s Encrypt certificates for our client domains.  Continue reading “DuoCircle Sponsoring LetsEncrypt.org” »

Domain Name Forgery is Alive and Well – Find Out How to Protect Yourself

Domain Name Forgery is Alive and Well – Find Out How to Protect Yourself

Cybercriminals are forging domain names to trick unsuspecting users

Not sure what a IDN forgery is? Click here and take a look at your browser’s address bar… go ahead, I’ll wait.

 

Most modern browsers will display “Apple.com” in the address bar, but it’s obvious that this isn’t the real Apple.com. This particular example well documented and the demo may be  shut down by the time you read this…but the real question is – – What happens when a cybercriminal uses the same approach to trick your users into sending sensitive data, such as log-in and password credentials to a website masquerading as your own companies brand?
Continue reading “Domain Name Forgery is Alive and Well – Find Out How to Protect Yourself” »

Shared Hosting IP Blacklist, There is a Solution

Shared Hosting IP Blacklist, There is a Solution

Hosting Providers should outsource their Outbound SMTP Services to prevent IP reputation problems

As a hosting provider, your email IP reputation is critical to your customer satisfaction, if your users email does not make it to the inbox… your customer support department gets flooded with tickets. Just one compromised account can wreck your reputation and have your support team reeling to resolve the RBL or other delivery issue. Continue reading “Shared Hosting IP Blacklist, There is a Solution” »

Pin It on Pinterest