MailStore, the feature-packed email archiving solution, has been updated with new features and enhancements for better security, performance, and an overall better user experience. Here’s a brief overview of these improvements.
Refreshed look for Outlook Add-in: Updated Icons for consistency with the latest versions of Outlook
The MailStore Outlook Add-in has been redesigned with a more modern look for better integration with newer versions of Outlook.
Improved Archive Performance
Improvements in the way MailStore handles archive stores internally have resulted in improved performance of mailbox archiving by up to 20 percent over earlier versions.
Easy access to setup guides in the Exchange archiving wizard
When configuring archiving for Microsoft Exchange, links to helpful online resources have been added for all supported versions of Microsoft Exchange and Office 365.
New folder structure options for export profiles
Improvements to export profiles now allow emails to be exported into specific, user-defined folders without replicating the archive folder structure. This provides easier handling of exported emails and helps avoid issues caused by restrictions on the export destinations (such as limitations on the export target’s maximum folder depth).
Removed support for older Windows platforms
MailStore is no longer supported on versions of Windows that are no longer supported by Microsoft (Windows Vista, Windows Server 2008 Standard or Windows Small Business Server 2008).
Orphaned archives shown on Privileges screen
Orphaned archives (those that do not have a user associated with them) are now shown on the “Archives and Privileges Overview” section of the “Users and Archives” configuration screen.
A “Print Message” button has been added to the Outlook Add-in.
Audit Log: Copy to clipboard now includes event details.
SMTP Settings: Support for multiple recipients (comma separated email addresses) has been added.
Thunderbird Support: MailStore warns users that archiving may be incomplete due to IMAP-backed Thunderbird profile.
jQuery security update to address potential XSS vulnerability.
Quick export of saved search results via context menu has been added.
This week, we learned of a new phishing campaign targeting PayPal users in an attempt to extract as much personal data as possible.
The campaign is spread via an email claiming to be from PayPal’s notification center warning users that their account was accessed from another browser or device. The recipient is then prompted to click on a button which opens an online form owned by the attacker.
If you’ve been following some of my previous posts, you may recall that I’ve discussed avoiding phishing email scams fairly frequently, but as long as people continue to fall victim to these and other email related scams, there will be a need for ongoing education on how to spot social engineering, spoofing, and other phishing-related tactics.
Consider this week’s PayPal phishing example. Cybercriminals often take advantage of the fact that many email clients (especially mobile devices) will only show the display name or “friendly from” header, and not the full email address. In the above example, “Support” was used as the display name, but the message was actually sent from an address under ovh.com.
If a user clicks on the link in the email, they are taken to a landing page operated by the attackers, and then presented with a fake login form where they are prompted to enter their email address and password.
From there, the user is asked for their full street address, and then they are taken to a form requesting credit card details.
At this point, most users would start getting suspicious, but those who proceed are presented with a form requesting their date of birth, Social Security number, and even their ATM or debit card PIN.
Users who go a step further are then requested to upload a photo of a valid ID or credit card.
Most reputable banking and government institutions have strict policies regarding their handling of confidential information. You’ll find more information on avoiding common email scams on PayPal’s website.
Phishing scams continue to evolve, with enough victims to keep cybercriminals in business for the foreseeable future. That’s why it’s important for businesses of all sizes to provide their employees with ongoing training on how to recognize and avoid email scams. A good place to start would be to review these 10 tips to identify a phishing email, and as always, remain vigilant and be skeptical of any online requests for information.
Despite the rumors announcing the death of email, its use continues to grow. According to research from the Radicati Group, email traffic is predicted to grow to over 333.2 billion emails sent per day (from the current 306.4 billion emails). And as long as businesses continue to use email, cybercriminals will find new ways to exploit security gaps, software bugs, and basic human nature to extort millions of dollars from their victims.
Here are our top 15 recommendations to protect your business from email-borne threats with Security Gateway
Security Gateway was designed to be easy to use while providing the strongest protection against spam, phishing, and data leaks. And while most security settings are configured for optimal protection by default, it’s a good idea to follow these guidelines for best results.
Verify That a User is Valid before Creating an Account
With every incoming message addressed to an unknown local user, Security Gateway needs to be able to verify that the account is a valid local user by querying Office 365, Active Directory, MDaemon, or another data source before creating the account and delivering the message. We recommend using one the five user verification sources found in Security Gateway to validate accounts.
Use SMTP Authentication to Prevent Unauthorized Account Access
To help prevent unauthorized account access, we recommend requiring SMTP Authentication unless a message is transmitted from a domain mail server.
Use Strong Passwords
Spammers will often try to hijack an email account by guessing its password. Therefore, passwords that are easy to guess should always be avoided. If Security Gateway is configured to create accounts automatically by querying a user verification source, then make sure your user verification source is configured to require strong passwords. Passwords can also be assigned to users manually via the Domains and Users menu.
Enable Dynamic Screening
Enable Dynamic Screening to block connections that exhibit suspicious activity, such as failing too many authentication attempts, connecting too many times in a given time frame, attempting to keep a connection open too long, or sending to too many invalid recipients. Dynamic Screening makes it more difficult for a malicious person to guess passwords by detecting the malicious activity and blocking the connections.
Enable Account Hijack Detection
If a spammer guesses an account’s password, he can then use that account to send out spam. To limit the spammer’s ability to abuse a compromised account, enable Account Hijack Detection, and then enter the maximum number of messages that can be sent in a given time frame. Once the limit has been reached, the account is disabled and the administrator is notified.
Enable at Least One Default Mail Server
When email arrives for a domain that has not been assigned its own mail server, Security Gateway needs to know where to send those messages. We recommend adding a default mail server for all Security Gateway domains that have not had domain mail servers specifically associated with them.
Prevent Unauthorized Mail Relaying
Relaying occurs when mail that is neither to nor from a local account is sent through your server. Servers that are not properly configured to prevent relaying can end up on a blacklist. By default, Security Gateway does not allow mail relaying.
Protect Your Domain with IP Shielding
IP Shielding is a security feature that only honors SMTP sessions claiming to be from someone at one of the listed domains if they are coming from an IP address associated with that domain.
The best way to secure outbound email is via SMTP authentication. However, for businesses that need to send email from a printer or other device that is not capable of authenticating, IP Shielding can be used to exclude certain IP’s or ranges from having to authenticate. Messages from authenticated sessions can optionally be exempt from IP Shielding requirements.
Enable SSL to Ensure Data Privacy
To protect the privacy of transmitted data, we recommend enabling the SSL encryption features for SMTP and HTTP.
Enable Backscatter Protection
Most spam messages contain a forged return path. This often leads to users receiving thousands of delivery status notices, auto-responders, and other messages in response to messages that the user never sent. This is known as backscatter. To combat backscatter, Security Gateway’s Backscatter Protection feature can help to ensure that only legitimate Delivery Status Notifications and auto-responders get delivered to your domains.
Don’t Whitelist Local Email Addresses
In many cases, local IP addresses or host names may need to be whitelisted. However, we do not recommend whitelisting local email addresses. If a local address is added to the whitelist, messages sent to this address could bypass many of your security settings and put your server at risk of being blacklisted.
Protect your Email Infrastructure from Virus and Spam Outbreaks
Security Gateway scans all inbound and outbound mail using the Cyren and ClamAV antivirus engines. It also includes Cyren Outbreak Protection, which is real-time anti-spam and antivirus technology that is capable of proactively protecting your email infrastructure automatically and within minutes of an outbreak.
Prevent Data Leaks
Security Gateway includes over 70 Data Leak Prevention rules to help prevent unauthorized transmission of sensitive information such as personal identification numbers, credit card numbers, and other types of confidential data. These rules can be configured to send messages containing sensitive content to the administrative quarantine for further review, redirect the message to a designated address, or encrypt the message.
We recommend enabling the appropriate Data Leak Prevention rules to suit the needs of your specific business or industry.
Enable Location Screening
Use Location Screening to block inbound SMTP and HTTP connections from unauthorized countries. If your company has no legitimate business need to communicate with a particular country, then refusing connections from that country can potentially block large amounts of spam. Alternatively, you can configure Location Screening to only prevent authentication from unauthorized countries.
Enable Macro Detection in Microsoft Office Documents
Cybercriminals often use macros in email attachments to spread malware. In Security Gateway 6.5 and up, the Virus Scanning settings include an option to detect macros in Microsoft Office documents and flag them as infected. Security Gateway can refuse these messages or quarantine them for administrative review.
Would you like to learn more about Security Gateway for Email? Visit SecurityGatewayForEmail.com to sign up for hosted or on-premise email protection.
At about this time last year, Office 365 had around 155 million users, and businesses continue to adopt its services at a rate of around 3 million users per month. But as subscription rates continue to grow, it becomes a growing target for cybercriminals to spread phishing and ransomware attacks.
A big drawback of such a large hosted service is that if cybercriminals manage to take over one of its accounts, it can be used to spread thousands of phishing attacks. And because these attacks are sent from a legitimate Office 365 account, they are likely to get past Microsoft’s Exchange Online Protection (EOP) and Advanced Threat Protection (ATP).
To combat these growing threats, businesses are turning to third-party email security gateways, and there are plenty of them out there with a relatively standard set of anti-spam and anti-phishing features, so to stand out from the competition, a solid email filtering solution must be easy to use while providing additional features such as archiving, compliance, and reporting.
For businesses on Office 365, Security Gateway offers stronger protection against email-borne threats, with account-verification controls tailored specifically for Office 365 to ensure that only authorized users are permitted to send or receive email.
Of course, Security Gateway does much more than protect your users from spam & phishing. It also includes built-in archiving with retention policies and legal hold for businesses that must meet legal compliance laws or that want a backup & recovery solution for a little peace of mind in the event of an outage or security breach.
Security Gateway also includes Data Leak Prevention (DLP) to prevent sensitive business data such as Social Security Numbers, Tax-ID Numbers, banking info, and much more from getting into the wrong hands. Messages containing confidential data can be encrypted using the built-in email encryption options, or sent to the administrative quarantine for further review. After all, all it takes is a quick Google search to find a list of companies that have suffered steep fines, lost customers, and a damaged reputation due to sensitive data getting exposed.
We know you have choices with your email security solution. At MDaemon Technologies, our team of experts have been in the email security business for over 25 years. And while we have the resources and vision to address emerging messaging, collaboration and security needs into the future, our team is small and agile enough to build relationships with our customers for that personal touch that you just can’t get from a large company.