Ransomware is a violent and deadly form of attack that each year results in the loss of more than a billion dollars to corporations. Six out of every ten virus payloads were ransomware in 2017, with companies being subjected to this form of attack every 40 seconds, on average.
Spam is more than a nuisance — it is a scourge that, if unchecked will wreak havoc on an entire organization. In the best case, inboxes are flooded with oceans of superfluous email, and servers are overwhelmed. In the worst case, spam can be a vector for malicious attachments, malware and viruses.
We are making two new changes to the way that the email system processes mail in an attempt to cut down on spam. We are adding additional validations and checks to ensure that the domains mentioned in the SMTP envelope are valid and have a functional DNS record.
Continue reading “Validating To: and From: Addresses” »
Each year, an increasing number of spam emails are sent to corporate employees, threatening to clog corporate email servers and slow productivity to a crawl. With the rising concern to business that spam has created, more organizations are turning to cloud-based spam filtering solutions to ameliorate the threat of disruption from spam.
Email threats come in a variety of forms. With over 90% of security threats beginning with some form of email attack, it is imperative that organizations educate their users on these forms of attack, get better email hosting and take steps to harden their networks against them. Three of the most commonly seen broad categories of email threat are Phishing, Ransomware, and Domain Name Spoofing.
Ransomware is a multi-million dollar a year online business that can strike any organization.
Both Ransomware and legitimate business engage in email marketing campaigns with the intent of making sales to new customers. In the case of legitimate business, some good or service of value is returned to the client. In the case of ransomware, business is slowed or halted by malware that locks or deletes files, and a ransom is demanded that may or may not stop the attack or reverse the damage if paid. Ransomware is criminal but make no mistakes: its top producers make millions of dollars a year in revenue.
The number of ransomware attacks is increasing worldwide, which forces corporate IT teams to come up with innovative solutions to combat the threat.
But email based threats like ransomware are costly and difficult to fight with on-site solutions alone. With an on-site solution, by the time the existence of ransomware is known, the threat is already wreaking havoc across the network.
Once ransomware gains access to a company’s systems, it’s too late. In the best cases, only a few isolated computers are held hostage. But if shared network drives are present, the ransomware can propagate across entire corporate networks, quickly bringing the organization to its knees.
Spam is more than just an annoyance, and effective spam filtering is a critical part of any IT security plan. Each day, corporate email servers are inundated with a vast amount of spam. To combat this rising tide, organizations need sophisticated spam filtering. When proper spam filtering is in place, employee inboxes are kept free of unwanted messages, and unwanted traffic stays off the network.
Microsoft® Office 365™ is a fantastic choice for companies that want to implement a cloud-based email solution.
Unfortunately, however, the out-of-the-box email archiving solution provided by Office 365 doesn’t meet the stringent security requirements or give the functionality that most organizations expect and demand. These functions include limitations on the number of saved searches, the total volume of messages stored in the archive and ALL users, not just active users are billed at the full rate.
A phishing attack takes advantage of the user’s trust by impersonating an email from a friend, associate, well known business contact or senior management.
The user is tricked into sharing login credentials, account information, personal or corporate data, or other sensitive information. Often, the user is asked to click on a link to a site that looks exactly like the real thing: online banking site spoofs are common, as are paypal, google login pages or almost any cloud service.