Microsoft is Ending Support for Windows 7. Here’s how to Move MDaemon and Security Gateway to the Latest OS

Microsoft Ends Support for Windows 7. Here's how to move MDaemon and Security Gateway for Email Servers to a new server.

Today, Microsoft is ending support for Windows 7. And while MDaemon and Security Gateway continue to support Windows 7, it’s a good idea to consider updating your Windows installation or migrating to an updated system.

Fortunately for MDaemon and Security Gateway users, moving to a new server isn’t a complicated process.

Moving MDaemon to a New Server or OS

Moving MDaemon to a new server using the same directory path involves these tasks:

  1. On the existing server, remove the MDaemon system service.
  2. Deactivate MDaemon & its associated plugins.
  3. Copy the MDaemon directory to the same path on the new server.
  4. Install the same version of MDaemon on the new server.
  5. Activate MDaemon on the new server.

For more detailed instructions, you can follow the steps outlined in this knowledge base article to move MDaemon.

If you’re moving MDaemon to a different directory path on the new server, you’ll need to update a few configuration files to point to the proper path, but this process isn’t complicated. Simply follow the steps outlined here to migrate to the new server on a new path.

Moving Security Gateway to a New Server or OS

To move Security Gateway, simply make a backup copy of the Security Gateway database, shut down Security Gateway, install Security Gateway on the new server, and then restore the database file.

You’ll find step-by-step instructions for moving Security Gateway in this knowledge base article.

“Will my software stop working after Microsoft ends support for Windows 7?”

MDaemon and Security Gateway will continue to support Windows 7, but because Microsoft will no longer provide automatic security updates, it’s a good idea to move to a newer operating system to remain secure.

If you need help, our expert support staff is available to provide guidance.

Year in Review – Our Top New Features of 2019

MDaemon Technologies - Year in Review

With 2019 coming to a close, I’d like to announce a few product updates. 2020 is going to be an exciting year for new features, but until then, we’ve made a few improvements in MDaemon, MDaemon Connector for Outlook, and Security Gateway for Email Servers.

New Security Features

Macro Detection in Email Attachments

A common tactic used by scammers to distribute malware is to send emails containing attachments with a message asking the user to enable macros. In fact, this tactic has been used extensively by the Emotenet botnet during its recent resurgence after a period of inactivity. Once enabled, these macros can unleash malware that destroys your data or infiltrates your network. To help protect users from these threats, a new option was added to MDaemon Antivirus and SecurityGateway to detect macros in documents scanned by Cyren AV and flag them as infected for further review by the administrator.

Antivirus Macro Detection
Antivirus Macro Detection

Authentication Failure & Frozen Account Reports

To help users maintain awareness of unauthorized account access attempts, a new setting was added to MDaemon’s Dynamic Screening feature to notify the user after a given number of failed authentication attempts or after the account has been frozen.

MDaemon Email Server Authentication failure tracking - Dynamic Screening Notifications
Dynamic Screening Notifications

Regulations & Backup/Restore Features

Email Archiving in SecurityGateway

Any business that has lost data to a malware attack or suffered fines for not meeting regulatory requirements will benefit from a solid backup and recovery solution. To help businesses meet these needs, archiving was added to SecurityGateway. Advanced searching options make it easy to find archived messages based on the sender, recipient, message subject, message content, date range, attachment, and much more.

Archiving in SecurityGateway for Email Servers
Archiving in SecurityGateway for Email Servers

Email Journaling

Businesses that need to meet regulatory and compliance requirements or provide document retention for litigation requests can use SecurityGateway’s new Journaling feature. Journaling creates a backup copy of every email sent and received, along with a summary of the message’s sender, recipient, subject, and date, and stores it in a separate mailbox that cannot be accessed by end users.

SecurityGateway Archive Journal Reports
SecurityGateway Archive Journal Reports

Privacy

New Data Leak Prevention Rules

Your data is your business’ most valuable asset, so if it lands in the wrong hands, it could lead to devastating financial losses as well as a loss of trust. To help businesses keep confidential data such as credit card numbers, Social Security numbers, and bank account numbers from being stolen over 60 new data leak prevention rules were added to SecurityGateway to protect against transmission of a wider variety of sensitive data.

Data Leak Prevention in SecurityGateway
Data Leak Prevention in SecurityGateway

Usability

Saved Searches in MDaemon Webmail

Over the past year, we added new features to MDaemon Webmail to help users stay organized, including automatic creation of “All Unread” and All Flagged” saved searches. When you log into MDaemon Webmail, you’ll receive a pop-up message asking you if you’d like to create these saved searches. Simply confirm to add them to your folders list.

MDaemon Webmail - Saved Searches
MDaemon Webmail – Saved Searches

Expired Webmail Session Notifications

If you’ve been logged into MDaemon Webmail for a period of time, you may not have noticed your session has expired. Beginning with MDaemon 19, MDaemon Webmail will display (EXPIRED) on the browser tab to help notify users that they’ve been logged out without having to switch tabs.

Expired Session notification in MDaemon Webmail
Expired Session notification in MDaemon Webmail

New Mobile Theme for MDaemon Webmail

Most of us are using our phones more than we’re using our desktop to check email, and you shouldn’t have to sacrifice features for the convenience of anywhere access. To address these needs, MDaemon Webmail’s mobile theme has been redesigned with a more modern look, plus a variety of new features previously only found in desktop themes. New email management features include email templates, personalized categories, drag & drop email filters, an email signature editor with support for multiple signatures, deferred delivery, message snooze, message recall, and sorting options.

Calendar features for the new Mobile Webmail theme include importing and exporting in CSV or ICS (iCal) format, support for external calendars, private access links, simultaneous multi-calendar view, and much more.

MDaemon Webmail - New Mobile Theme
MDaemon Webmail – New Mobile Theme

Performance

Businesses with higher email usage environments will benefit from these new features for SecurityGateway.

64-Bit Version of SecurityGateway

This year, we added a 64-bit version of SecurityGateway. This allows 64-bit operating systems to take advantage of the extra processing power that’s achieved by allowing more operations to be performed at a time. The 64-bit version can handle a higher volume of active connections for improved performance.

External Database Support in SecurityGateway

External database support has been added to SecurityGateway, so you’re no longer limited to using the built-in Firebird database. When an external Firebird database is used, multiple items can access the database at the same time, which helps improve performance.

Administration

Support for Multiple SSL Certificates

In the past, when adding a new domain and host name to an existing MDaemon server, administrators had to remove and re-create the SSL certificate, or re-issue the third-party certificate. In 2019 we added support for Server Name Indication (SNI) to MDaemon. With SNI, each host name can have its own SSL certificate, which means you no longer have to delete and re-create existing certificates and share them among new domains/host names. Simply create the new SSL certificate & assign it to the new host name.

Centralized Management of Email Signatures

If your business allows users to create their own email signatures, you may have noticed there’s no consistency, with variations in text formatting, images, or overall layout of the signature. In MDaemon 19.5, we added support for centralized management of email signatures.

Central Management of Email Client Signatures
Central Management of Email Client Signatures

More Features Coming Soon!

This is by no means an exhaustive list of all new features. Our developers have devoted countless hours to making MDaemon the best email and collaboration product on the market, and 2020 is going to be even more exciting, so check back for new features and updates!

News Roundup – November 25, 2019

This week, we present the latest stories and events in the field of email, email security, phishing, data breaches, regulations, and trends.

Ransomware in the News

I’m old enough to remember life without a computer in the house, so I was a bit surprised to learn that the first ransomware attack happened 30 years ago!

Cybercriminals have come a long way since 1989 as they continue to employ a mix of oldWeekly Email Security and IT News and new tactics to scam businesses and end-users out of millions of dollars. For the second time this year, Louisiana’s state government systems were hit with ransomware. Fortunately, they were better prepared after the previous attack, so they suffered no data losses and did not pay a ransom.

Other reported incidents included:

Business Email Compromise Threats Continue

Business email compromise continues to be a growing threat due to the potential to extort large payouts from victims. A prominent incident reported last week included one in which fraudsters diverted $742,000 from the City of Ocala in Florida.

Reports of business email compromise typically discuss the facts about the incident itself – how it happened, how much money was lost, and actions taken to protect from future losses, but what is rarely reported is what legal action, if any, a company takes against the employee who was successfully tricked by one of these scams. But last week, a judge ruled on a case against an employee of a Scotland based company who was tricked into transferring approximately $200,000 to a cybercriminal.

Other Recent Incidents

Other recent incidents include:

New Trends We’re Watching

Other recent incidents show evolving threat vectors and attack techniques, including the Raccoon Stealer malware that bypasses Microsoft Messaging Gateways, a WhatsApp vulnerability that can remotely execute code, specially crafted ZIP filese used to bypass secure email gateways, Google Assistant on Android devices could be tricked into taking photos or videos, and the growing threat of fake Windows updates.

Staying  informed of current and emerging threats and tactics is the first step in protecting yourself and your business. Check back often for the latest updates..

Business Email Compromise Discussed on NPR’s Morning Edition

business email compromiseEarlier this week, I heard an interesting interview on NPR’s Morning Edition with a recent victim of Business Email Compromise (BEC), a growing threat that uses social engineering to exploit human nature in order to divert massive amounts of money to cybercriminals.

Recent Business Email Compromise Trends show Evolving Tactics

First, let’s start with a little background information. In 2013, when Business Email Compromise scams were gaining popularity, attackers typically compromised a legitimate email account belonging to the company president, CEO or CFO in order to request the transfer of funds to an account controlled by the attacker. As awareness of BEC scams has grown, the tactics used by the scammers to avoid detection have evolved as well. These newer deception methods use compromised lawyer email accounts, requests for W-2 records, and the targeting of real estate transactions. Another recent trend involves spoofing a company executive or other position of authority and requesting the targeted victim purchase gift cards for personal or business reasons.

Over the past couple of years, BEC tactics have further evolved into a new trend known as Vendor Email Compromise in which cybercriminals target vendors or suppliers with phishing emails and then send realistic-looking invoices to their customers in order to steal money.

BEC scams have been wildly successful, with $1.2 billion in losses reported in 2018 by the FBI’s Internet Crime Complaint Center (nearly triple 2016 losses). Unfortunately, these are only REPORTED losses. Many incidents go unreported because companies don’t want to risk bad publicity.

While recent efforts by law enforcement agencies have led to many arrests, Michael J. Driscoll, FBI special agent in charge of the Criminal Division for the bureau’s New York Field Office, has named Business Email Compromise the #1 priority – replacing ransomware as the biggest threat facing businesses.

And that brings me to the interview I heard on NPR.

This week on Morning Edition, Martin Kaste interviewed “Mark” (not his real name), the owner of a Seattle-based real estate company and one of the earliest victims of Business Email Compromise. Mark discussed how the attack began and how it evolved.

It started with a scammer intercepting email traffic between Mark and a business partner. For a period of time, the scammer monitored this email traffic and studied their speech, writing patterns and message timing (see Step 1 here). When Mark and his partner discussed a $50,000 disbursement owed to the partner, the scammers took action and inserted their own wire transfer instructions (see Step 3 here).

Mark was convinced the request was legitimate, and transferred the $50,000 (Step 4) to the scammer’s bank account. His partner never received the money. By the time they alerted the bank, the money had already been transferred to an overseas account.

Mark said, “We’re somewhat experienced businesspeople. The idea that we’ve been duped makes you feel pretty stupid,” and as I mentioned, this “shame” element, along with fear of a damaged business reputation, is why many of these incidents often go unreported.

Kaste points out, “The banks weren’t much help, either. Since he was the one who gave the scammers the account number, they saw this as his responsibility. He has learned one thing – never again trust wiring instructions that are sent by email.”

And that sound advice is among other tips you’ll find in my earlier post on avoiding Business Email Compromise scams.

You can listen to the full interview from NPR’s Morning Edition here.

Security Gateway 6.5 – With Improved Attachment Handling & Database Support

If you’re in charge of managing your company’s email, whether you’re running an in-house Exchange server or Office 365, you’ve certainly become all too familiar with the latest threats posed by cybercriminals – threats that go far beyond the old-school Nigerian Prince email scam that has become the brunt of jokes over the past couple of decades. So if protecting your employees from email-borne scams is important to you & your business, a secure email gateway to protect against phishing, malware, data leaks and other threats would be a sound investment.

If you’re looking for email security solution that will block the most spam, viruses, and phishing threats, with user-friendly email traffic reports, email archiving, and Data Leak Prevention (DLP) at a price that’s affordable for small businesses, consider Security Gateway for Email Servers.

Announcing Security Gateway 6.5!

This week, we released Security Gateway 6.5, with improved attachment handling and external database support.

Macro Detection in Office Documents

Cybercriminals often use macros in email attachments to spread malware. In Security Gateway 6.5, the Cyren Antivirus engine can be configured to detect macros in Microsoft Office documents and flag them as infected.

SecurityGateway for Email Servers - Antivirus Flag Macro
SecurityGateway for Email Servers – Antivirus Flag Macro
Improved Handling of Restricted Attachments

Messages sent from Microsoft Outlook in Rich Text format are sent with an embedded file containing formatting data. Receiving email clients that do not understand this data may display it as a Winmail.dat attachment. To prevent users from bypassing the restricted attachments list by attaching restricted file types to rich text emails, SecurityGateway can now look inside Winmail.dat attachments for restricted file.

Security Gateway can now also scan RAR archives for restricted attachments.

External Database Support

Security Gateway installs with its own embedded Firebird database, however, in the latest release, administrators can configure Security Gateway to use an external Firebird database for improved performance.

Other Improvements

These are just the highlights. Additional features include email archive journal reports plus enhancements to manage archive and Sieve scripts via the API. You can read the full list of new features here in the release notes, or download your free trial to begin protecting your business against the latest threats!

Recent Business Email Compromise (BEC) Scams are Reminder to Educate Users

Online scams are nothing new. But as email has evolved and improved, so have scammers and the messages they send. Nefarious emails, attachments and links now appear sophisticated and look legitimate, sometimes tricking even the most meticulous user.

Billions Lost to Business Email Compromise

Over the last three years, organizations all over the world have lost a collective $26B to a very specific type of email scam – Business Email Compromise, or BEC. Recently, a BEC scheme in Spain was brought down, but not before taking over €10M. A scammer in Canada impersonated a contractor and fooled city employees out of over $1M. And the FBI is investigating a network of over 80 people across multiple countries in an attempt to use a BEC plot to steal $46M.

Why do BEC Scams Work so Well?

Top 10 Business Email Compromise Protection Tips
Top 10 Business Email Compromise Protection Tips

BEC emails are advanced phishing scams, and they’re on the rise. But what makes a BEC attack so dangerous, and so effective?

BEC Scams are Highly Targeted

Scammers aren’t blasting thousands of the same email. They’ve done the research, monitoring the company’s website and social pages. They find the appropriate target, and groom them by sending multiple conversational emails, establishing trust.

They Contain No Malware

Unlike the old style of phishing, where users are told to click on a link, BEC emails have no spammy links. This means they can sometimes evade spam filters, and the end user doesn’t see any red flags.

They Exploit Human Nature

BEC emails imitate an actual person, complete with real-looking email addresses, formatting, company names, and titles. The victim has unknowingly been emailing back and forth with the scammer and trusts that they are who they claim to be. So when asked to send bank information, for example, the victim assumes the request is authentic and complies.

They are Often Under-reported

Victims often don’t realize they made a mistake until much later. And even upon realization, many companies don’t report the incident for fear of damaging their reputation with their customers. Not reporting such incidents allows perpetrators to simply move on to their next victim.

Learn How to Stay Protected Against these Email Scams

Preventing losses to Business Email Compromise is the responsibility of both the end user and the IT administrator. To stay protected, follow these tips:

End Users:
  • Double-check the sender email address & recognize spoofing and other impersonation tactics. MDaemon Webmail displays the full email header to help users identify spoofed emails.

    MDaemon Webmail Full Email Header Display
    MDaemon Webmail Full Email Header Display
  • Don’t overshare on social media
  • Don’t open email from unknown sources
  • Verify all wire transfer requests via phone or face-to-face
  • Know customers’ & vendors’ business practices
  • Run antivirus software often
  • Use two-factor authentication
  • Forward, don’t reply. Ensures you manually enter the appropriate email address.
Administrators:
  • Enable reverse lookups to verify the legitimacy of the sender
  • Use the antivirus features in MDaemon and SecurityGateway to scan all inbound and outbound email traffic
  • Require users to use SMTP Authentication
  • Use SPF, DKIM & DMARC to secure your domain against spoofing
  • Require two-factor authentication
  • Require strong passwords
  • Provide regular end-user training
  • Run antivirus software often and make sure virus signatures are up-to-date

While traditional security measures such as network defenses and email gateways can be effective at blocking most varieties of spam, the bottom line is that the most critical part of stopping BEC attacks is user awareness and education.

3 Ways Security Gateway for Email Helps Businesses Stay Compliant

Staying informed of the latest data privacy regulations can be a challenging endeavor, with a plethora of different security and retention requirements based on industry. And as these laws and regulations continue to evolve, businesses will need to evolve as well to keep up.

The timeline for compliance with new data privacy laws is “yesterday”

As Cynthia Cole, special counsel in the Palo Alto technology practice at law firm Baker Botts says in a recent interview, the timeline for data privacy compliance is “yesterday”. And because cybercriminals continue to target users with phishing campaigns and malware downloads, user education continues be a top priority.

So whether you use Office 365, Microsoft Exchange, or any other on premise or cloud hosted email service, are you confident you are protected from accidental or intentional exposure of confidential information contained in email, such as Social Security or Tax-ID numbers, or bank account numbers?

Archiving with Data Retention & Legal Hold in Security Gateway

Security Gateway includes built-in archiving and data retention policies, plus legal hold, to help businesses meet evolving data retention laws. It’s simple to set up and can help your business avoid serious litigation headaches.

Prevent Leaks of Sensitive Data

Companies of all sizes continue to suffer data breaches, and while the larger victims often make the news, many smaller companies don’t, and as many businesses have reported losses, countless more have fallen victim but have chosen not to report the incident in order to protect their reputation.

A small, early investment in additional email security and compliance can help your business avoid much costlier losses later.

Security Gateway’s Data Leak Prevention feature can help protect businesses against the loss of confidential business data transmitted via email, such as PHI (protected health information), financial data, Social Security numbers, and much more. Messages containing sensitive data can be encrypted or sent to the administrative quarantine for further review.

If you’re ready to start protecting your business against regulatory violations and data leaks, sign up for a free trial of Security Gateway for Email, and if you have questions, leave us a comment or click here to contact us by phone or email.

Announcing MDaemon 19.5 – With Redesigned Mobile Webmail & More!

The news is out. There’s a new version of MDaemon Email Server, with new features and improvements to benefit both administrators and end-users alike!

New Features for Administrators

Centralized Management of Email Client Signatures

Most businesses follow certain custom branding practices in their email communications, but inevitably there will be those end users who have not updated their email signature to adhere to these branding practices, introducing inconsistencies in the company’s branding image. To help businesses maintain consistent branding and appearance of company email, MDaemon administrators can now configure default and per-domain email client signatures that are personalized for each user and pushed to supported email clients (MDaemon Webmail and MDaemon Connector for Outlook).

Both plain-text and HTML signatures are supported, and macros can be used (here’s a handy macro reference guide) to automatically populate various fields from the user’s account. You can even add images and links!

MDaemon Email Server - Client Signatures
Centralized management of email client signatures

When using MDaemon Remote Administration, adding signatures is made even easier using the available editing and formatting tools. You can even add your company logo by simply dragging the image into the window.

Centralized management of email client signaturs with MDaemon Remote Adminisration
MDaemon Remote Administration – Default Email Client Signature

Macro Detection in Email Attachments

Cybercriminals often attach Microsoft Office files containing malicious macros to their spam & phishing email messages. They then use social engineering to try to trick the user into opening the attachment (which may be disguised as an invoice, payment receipt or legal document) and enabling macros. From there, the macro goes right to work, unleashing malware that can take down your network, or ransomware that can take days to remove, costing your businesses thousands of dollars in lost revenue.

To help prevent these attachments from reaching users, MDaemon Antivirus has a new setting to detect macros in documents scanned by Cyren AV and flag them as infected for further review by the administrator.

MDaemon Antivirus - Macro Detection in Attachments
MDaemon Antivirus – Macro Detection in Attachments

New Features for End Users

New Mobile Theme for Webmail

These days, most people use their smartphones for just about everything, from banking or surfing the Web, to conducting business via email, so whether you’re using the largest Microsoft Surface tablet, or the smallest iPhone or Samsung Galaxy, you need access to your most important email and collaboration features at all times.

Redesigned MDaemon Webmail for Mobile Devices - with responsive design for mobile phones and tablets
Redesigned MDaemon Webmail for any Screen Size

To help users on the go stay organized, the Mobile Theme for MDaemon Webmail has been redesigned with a more modern look, and includes a variety of new features previously only found in desktop themes. New email management features include email templates, personalized categories, drag & drop email filters, email signature editor with support for multiple signatures, deferred delivery, message snooze, message recall, and sorting options.

Calendar features for the new Mobile Webmail theme include importing and exporting in CSV or ICS (iCal) format, support for external calendars, private access links, simultaneous multi-calendar view, and much more.

But that’s not all…

These are just the major highlights. You can read the full list of improvements in the MDaemon Release Notes.

Still using Exchange? Are you unhappy with your hosting provider’s product support? Try MDaemon free for 30 days, or visit our MDaemon Hosted Email Options page to sign up for hassle-free cloud hosted email!

Security Gateway a High Performer Again – G2 Crowd 2019 Fall Report

We’re proG2 Crowd High Performer 2019ud to announce that Security Gateway for Email has once again been named a High Performer in Secure Email Gateways by G2 Crowd in their Fall Report. And if you are looking for a hosted solution, Security Gateway also was recognized as a top Cloud Email Security solution.

Security Gateway for Email Servers - High Performer 2019
Security Gateway for Email Servers – High Performer 2019

G2 Crowd awards are based on honest reviews from users. In other words, the product is recognized because of the feedback from users just like you who use the product every day; awards that reflect a superior customer experience.

The data from G2 Crowd speaks for itself – Security Gateway received satisfaction ratings above 90% in the Ease of Set Up, Ease of Use, Ease of Admin, and Quality of Support categories; ratings that exceed the category average scores.

Why Users Love Security Gateway

Easy to Use 

Security Gateway Review from G2 Crowd

SecurityGateway is designed to be simple and easy-to-use. Set-up, configuration and maintenance is easy for the administrator, and every-day tasks like accessing quarantine reports is easy for the end user.

Best Results

Security Gateway for Email Review - G2 Crowd

With SecurityGateway you get results, which means you DON’T get malicious emails in your inbox. We protect email communications for businesses of all sizes and verticals, regardless of which email platform they use and whether it’s in-house or in the cloud.

Reliable

Security Gateway Review

Try Security Gateway for Free and Compare its performance and Cost to Your Current Solution

Security Gateway is one of the best email security gateways in the market. Find out what organizations of all sizes already know – Security Gateway saves you time, headache and money.

Click here to learn how Security Gateway can protect your email!

Office 365 Vulnerabilities Every Business Should Consider

While many businesses are moving their email from on-premises to the cloud, many that have already made the switch have discovered that cloud hosted email has its share of drawbacks to go along with the benefits these businesses had originally sought.

To help businesses make the right decision when choosing an email and collaboration solution, we’ve created the following infographic to illustrate key areas to consider when deciding whether to use an on-premise email server such as MDaemon or to go with G Suite, Office 365, or another hosted email provider.

Contact us if you’d like to learn more about MDaemon. We also offer personal demos for businesses needing an overview.

Infographic: Top 10 Reasons to use MDaemon Email Server over Office 365
Top 10 Reasons to use MDaemon Email Server over Office 365