While many businesses are moving their email from on-premises to the cloud, many that have already made the switch have discovered that cloud hosted email has its share of drawbacks to go along with the benefits these businesses had originally sought.
To help businesses make the right decision when choosing an email and collaboration solution, we’ve created the following infographic to illustrate key areas to consider when deciding whether to use an on-premise email server such as MDaemon or to go with G Suite, Office 365, or another hosted email provider.
Contact us if you’d like to learn more about MDaemon. We also offer personal demos for businesses needing an overview.
As we endure the heat of the “dog days” of summer here in the northern hemisphere, we start to see tell-tale signs of the approaching end of summer – kids going back to school, the sun setting slightly earlier each night. But not all good things must end in August. Therefore, I’m excited to announce the extension of our 15% off Summer Savings promotion – now through September!
Through September 30, when you make a new purchase of MDaemon or purchase, renew, or upgrade Security Gateway, you’ll automatically receive 15% off the regular price.
Whether you’re tired of the expense and headache of managing Microsoft Exchange Server, or are looking for a secure, affordable alternative to Kerio, IceWarp, or Gmail, MDaemon’s migration tools can help you migrate your business email and groupware data. Additional migration information and how-to guides for Security Gateway can be found on our Literature page.
This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients. The email came from Google Drive, but the sender address didn’t match the company’s standard naming convention for email addresses.
Because the message was sent by a legitimate email service, it was able to bypass Microsoft Exchange Online Protection on its way to users’ inboxes.
No Spam Filter or Email Gateway can Block 100% of All Spam
Spam Filters and Email Gateways have proven quite effective at blocking most of the junk email that gets sent by the thousands on a daily basis, but cyber criminals are always looking for new ways to bypass email security measures through social engineering, new strains of malware, and newly-discovered security flaws reported in Microsoft Exchange Server and cloud email platforms. That’s why user training will continue to be a top priority for all businesses that use email.
Tips to Avoid Phishing and Business Email Compromise (BEC) Attacks
In a prior post, I listed the following 10 tips to avoid falling victim to phishing emails.. Here’s a brief summary. You can read the entire post here.
10 Tips to Identify a Phishing Email
Watch out for messages disguised as something expected, like a shipment or payment notification.
Watch for messages asking for personal information such as account numbers, Social Security numbers, and other personal information. Legitimate companies will never ask for this over email.
Beware of urgent or threatening messages claiming that your account has been suspended and prompting you to click on a link to unlock your account.
Check for poor grammar or spelling errors.
Hover before you click!
Check the Greeting – Is the message addressed to a generic recipient, such as “Valued customer” or “Sir/Madam?” If so, be careful & think twice!
Check the Email Signature – In addition to the greeting, phishing emails often leave out important information in the signature. Legitimate businesses will always have accurate contact details in their signature, so if a message’s signature looks incomplete or inaccurate, chances are it’s spam.
10 Tips to Protect Against Business Email Compromise (BEC) Email Attacks
Business Email Compromise goes beyond standard spam techniques by exploiting human nature and the trust established between employees and members of the executive team. Scammers use social engineering, CEO impersonation, and a variety of other techniques to trick users in accounting, finance, or other high-power positions into transferring money into the scammer’s accounts. These attacks are well-executed and targeted at specific individuals, and often take more time to plan and launch due to the amount of research that goes into these attacks. Cyber criminals use publicly available information on sites such as LinkedIn, Facebook and even the website of the targeted victim to gain insight into the company’s business practices. They will often study the writing styles of the executive team, allowing them to craft convincing emails that appear authentic to employees.
Because Business Email Compromise attacks are often so well-crafted, they are able to bypass standard security measures. These tips should help you identify a Business Email Compromise attempt if one should slip through your spam filter or email gateway.
Train Users to recognize these Common Impersonation Tactics used by Cybercriminals
Domain Name Spoofing
Display Name Spoofing
Lookalike Domain Spoofing
Secure your Domain by registering similar domains.
Don’t Over-share on Social Media
Use SPF, DKIM & DMARC to protect your domain from spoofing.
fWhen it comes to email archiving, businesses require features that go beyond simple message replication in order to meet expanding regulations. And because every email solution, whether it’s on-premises or in the cloud, needs strong anti-spam/anti-malware filtering, it makes sense to combine archiving and security into a single product. To address the growing demand for a combined email security/archiving solution, archiving was added to Security Gateway for Email Servers in version 6.0.
Security Gateway’s Integrated Archiving Just Got a Lot Better!
With Security Gateway 6.1, the integrated archiving feature received a major upgrade with these new features for legal compliance and cloud email integration:
Security Gateway’s new Legal Hold feature will prevent emails from being deleted from the archive, regardless of any other settings, user permissions, or retention periods.
Minimum Archive Retention Period
Businesses must meet a variety of data retention laws, and these laws vary by country or region. In the United States, many businesses must store archived emails in compliance with the following laws and retention policies:
IRS Regulations (for all companies) – 7 Years
Sarbanes Oxley Act (SOX – For all public companies) – 7 Years
Freedom of Information Act (FOIA – Federal, state & local agencies) – 3 Years
Department of Defense Regulations (for contractors) – 3 Years
Health Insurance Portability and Accountability Act (HIPAA) – 7 Years
To meet these and other growing regulations, administrators can assign a minimum retention period for all archived email messages. During this time, archived messages cannot be deleted regardless of any other settings or user permissions.
Improved Cloud/Hosted Email Integration for Microsoft Office 365 & Azure
Security Gateway’s automatic user creation feature helps reduce administrator workload by verifying whether an email sent to or from a local domain contains a valid email address, and then automatically adding the account once the email address has been verified. With Security Gateway 6.1, this process has gotten much easier for businesses using cloud email services, with a new option to verify users by querying Microsoft Office 365 or Azure Active Directory.
Other New Features
Other new features for Security Gateway include:
Whitelist & Blacklist Search – A search field was added to the Whitelist and Blacklist screens to help administrators find listed email addresses more easily.
Quarantine reports can now be sorted by score. This makes it easier to identify false-positives, which will likely have lower scores.
MDaemon Email Server and Security Gateway customers have made it clear – MDaemon Technologies delivers safe, secure email solutions that fit their unique business needs at a great price.
Users voiced their opinions on G2 Crowd this past quarter, earning both products a number of awards on the peer-to-peer review site. Recognition is based solely on customer reviews, with users rating products on what they like, what they dislike, and what problems the particular product solves.
MDaemon Email Server earned a 4.7 out of 5 star rating, netting the #2 slot in both the Highest Rated and Easiest to Use categories. In addition, customers’ positive comments also gave MDaemon Email Server the “High Performer” and “Users Love Us” badges.
Reviews of MDaemon Email Server praise the security and stability of the tool, ease of use and management, amount of control and customization, affordability, and value of customer support.
Meanwhile, Security Gateway also performed well against other email gateway products. Scoring 4.4 stars out of 5, Security Gateway placed third in the Easiest to Use group, and among the top 5 in the Highest Rated division. Security Gateway also garnered a “High Performer” badge for both the on premise and cloud Email Security Gateway solution.
Security Gateway users lauded the easy setup and management, robust security features, reporting capability, and the ability to customize the tool to fit their needs.
If you’re like me, you want an email client that’s easy to set up, easy to use, and easy on the eyes, and if it works well with MDaemon, then that’s a huge plus!
An email client that fits these criteria quite nicely is eM Client, a full-featured email client that supports email, contacts, calendars and tasks, and works on a variety of platforms and devices. Its touch-friendly design makes eM Client the ideal messaging and collaboration tool for smartphones and tablets.
eM Client is simple, elegant, customizable and easy to set up. Its built-in calendar works seamlessly with MDaemon’s free/busy server to help users avoid scheduling conflicts when planning meetings and events.
As our products have evolved over the years, with new features added regularly, older versions of our software are eventually no longer supported.
Effective July 30, 2019, technical support will be discontinued for the following product versions:
MDaemon – Versions 14.5.x and below
Security Gateway – Versions 4.5.x and below
Outlook Connector – Versions 4.5.x and below
SecurityPlus – Versions 5.0.x and below
For continued support, this is a great opportunity to renew your license and upgrade to most recent versions of our software to take advantage of the latest features! As a current user we offer an automatic 30% discount off the price of a new purchase!
Upgrade MDaemon today and get these exciting new features:
MDaemon Connector for Outlook (formerly Outlook Connector for MDaemon) has new features, too!
Outlook Connector has been re-branded as MDaemon Connector for Outlook, and, beginning with MDaemon 18, is now included with MDaemon as a licensed feature (via purchase of separate license).
Therefore, in the latest version of MDaemon, a separate download is not required on the MDaemon server. Simply enter your MDaemon Connector license key via Help | Register your MDaemon Products to activate MDaemon Connector for Outlook. Features introduced after version 4.5 include:
“Expired password” or “password change required” notification for end users
Administrator control over which Outlook add-ins are allowed or disabled
Junk Email folder / Blocked Senders support
S/MIME support for message signing and encryption
MDaemon Connector configuration reports for administrators, with Outlook send/receive schedules for all accounts.
Centrally-managed send/receive schedules
Nearing/over quota alerts for end users
New database management tools to help administrators maintain optimal performance
To ensure MDaemon and its plugins provide the most up-to-date security and best performance, we often provide maintenance updates to help our customers get the most out of their business email and collaboration server.
Most of us will likely be immediately suspicious due to all-caps “REMINDER!!!” at the top of the message, but what other phishing clues can you identify?
In this example, the scammer has used display name spoofing to make the message appear to be from DHL. Most large businesses such as DHL have policies regarding email communications. DHL’s fraud awareness policy, which you can read here on their website, states:
“Please be advised that if you received an email suggesting that DHL is attempting to deliver a package requesting that you open the email attachment in order to affect delivery, this email is fraudulent, the package does not exist and the attachment may be a computer virus.
Please do not open the attachment. This email and attachment does not originate from DHL.”
But for most of us who remain unaware of DHL’s policies, it’s important to know what to look for to avoid becoming the next victim to phishing scams.
Using the DHL example, I’ve labeled the items to look out for when reviewing a suspicious email.
No business is too big or too small to educate its users about phishing. After all, it only takes one user to open a malicious attachment and unleash malware vicious enough to take down an entire company. Learn more about how to avoid being the next victim by reviewing these 10 tips to identify a phishing email.