One of the things that we have noticed in the last few years is that the migration to the cloud has created a huge gap created by the migration to the cloud by Universities and Colleges. While Office 365 or Google Apps are attractive options of hosting current students and faculty and staff, they are not a good fit to handle the unique needs for alumni email forwarding.
In this age of rampant cyber attack, corporations must take measures to protect themselves. Since 91% of all cyber attacks begin with a phishing email, taking steps to defend against phishing attack might be the single most important aspect of an overall threat defense plan.
Despite the rise of tools like Slack, Skype or Jabber the reality is that nearly all business communication between companies is over email. When your mail server is compromised and goes offline, not only internal communications will be disrupted, but external ones as well. Sales inquiries, customer service requests, and important inter-business communication channels will be cut off, and inbound emails will bounce, causing potentially significant disruption and potential loss of revenue.
You may already know that Yahoo.com has a DMARC policy in place that prevents mail with yahoo.com in the from address from being delivered if it is sent from outside Yahoo’s infrastructure.
Yahoo is expanding this policy to their lower-volume Yahoo international domains below on Mar 28, 2016.
The list of domains that will become unusable is as follows:
We often write about preventing spam from getting into your mailbox, (as you know Spam Filtering is one of our most popular products), however we really don’t stop to talk about the problem of SMTP service providers inadvertently allowing their customers to send out what would be considered by the recipient to be SPAM or outbound spam protection.The tools, techniques, and mitigation required to defend an inbox are very well established and documented. But preventing authenticated, paying customers from abusing your network to send spam intentionally or because of a compromised system is an issue that we are attacking head-on.
By the time any business is aware that they are the target of a ransomware attack, it’s too late. Once a hacker has breached security and enticed a user to click on a malicious link or attachment, access to local data on that employee’s computer is locked. In order to unlock the data, a ransom must be paid. In about 91% of cases, the vector for ransomware is incoming email, often in the form of a spear phishing attack that purports to be from a sender known and trusted by the victim.
Spam is one of the most ubiquitous and costly annoyances to companies today. It clogs inboxes. It consumes storage space and bogs down email servers. And it consumes tremendous amounts of bandwidth with frivolous or dangerous messages and traffic. With the yearly increase in the volume of spam, finding the right spam blocking solution is vitally important to business, because without effective spam blocking, productivity can and will grind to a halt.
Ransomware is a violent and deadly form of attack that each year results in the loss of more than a billion dollars to corporations. Six out of every ten virus payloads were ransomware in 2017, with companies being subjected to this form of attack every 40 seconds, on average.
Spam is more than a nuisance — it is a scourge that, if unchecked will wreak havoc on an entire organization. In the best case, inboxes are flooded with oceans of superfluous email, and servers are overwhelmed. In the worst case, spam can be a vector for malicious attachments, malware and viruses.
We are making two new changes to the way that the email system processes mail in an attempt to cut down on spam. We are adding additional validations and checks to ensure that the domains mentioned in the SMTP envelope are valid and have a functional DNS record.
Continue reading “Validating To: and From: Addresses” »