As technical marketing specialist, I am responsible for maintaining the company's Twitter and Spiceworks (social networking for the IT community) presence. Responsible for delivering a complete software training solution to partners and customers.
Projects include design, creation, implementation and oversight of complete, interactive eLearning courses for MDaemon and SecurityGateway using Camtasia and Atrixware, and creation of all quick-start guides and training videos, providing live, web-based training for partners and distributors, and assisting others in the Marketing department with requests for technical guidance and idea generation on marketing-related website content and print deliverables. Provided on-premise training to approximately 60 colleagues at parent company (Research in Motion) headquarters in Waterloo, Canada, and gave live presentations at other company events, including BlackBerry World in Orlando, Florida.
One of the most common complaints of Outlook users is slow performance. We all know how frustrating it is when you launch Outlook, and right away, it freezes or takes a long time to start up, or when the Send/Receive process takes too long. Message search can also slow to a crawl.
So what causes Outlook to behave like this? The most common cause is having a mailbox that’s too large. This problem is so common because many users like to save every email they send and receive over time, resulting in a mailbox that’s bloated and out of control.
The solution is to implement an archiving solution such as MailStore, and configure message deletion rules so that archived messages are removed from the mailbox after a given period of time.
Whether you use POP (MailStore can archive PST files, too), IMAP, ActiveSync, or Outlook Connector, reducing the amount of data stored in user mailboxes improves Outlook performance by lowering the amount of data that it has to process on the server. While this can improve Outlook load times, it has the added benefit of improving mail server performance.
In addition to improving Outlook performance, archiving has these benefits for administrators:
Reduced storage requirements on the mail server
Improved mail server performance
Simplified backup & restore processes
Elimination of mailbox quotas
Elimination of PST files
Less reliance on users adhering to email retention guidelines
Adherence to compliance regulations
Prevent users from deleting email messages
Check out this post for more details on these other benefits of archiving.
Would you like to learn more about MailStore and how it can improve Outlook performance and help your business? Then visit our website and download your free trial!
You’ve probably heard that the vast majority of all email traffic is spam, but did you know the volume of spam as a percentage of all email traffic has gone down over the years? In April of 2014, spam made up almost 70% of all email traffic. The most recent records show spam at about 59% of all email traffic. While these numbers are down slightly, they are still quite significant, and thus email providers need to be armed with a variety of tools to combat spam.
For email administrators, one of the challenges of fighting spam is balancing tasks performed by the administrator with tasks that users can perform to take some of the workload from administrators. With SecurityGateway’s quarantine management features, users can be granted permissions to manage their own quarantines.
SecurityGateway can be configured to handle spam in various ways. Messages can be refused, quarantined, or accepted, and their spam scores can be adjusted accordingly. When messages are quarantined and held on the server, the administrator can determine whether, and how often, to send the user an emailed quarantine summary report. The administrator can also grant users permissions to view and manage their own quarantine folders in the SecurityGateway interface. The quarantine summary email allows users to release the message from quarantine, and whitelist or blacklist the sender. When the quarantine is viewed in the SecurityGateway interface, users have additional options, such as the ability to feed messages to SecurityGateway’s Bayesian spam learning engine. Giving users the ability to manage their own quarantines allows administrators to focus on other tasks.
We generally recommend using the Bayesian feature to mark a message as spam, rather than blacklisting the sender. Thus, to avoid any confusion, we’ve put together the following best practices guide on quarantine management in SecurityGateway.
We live in an era where the amount of valuable data businesses must store is increasing at an unprecedented pace. Consequently, the number of “bad guys” trying to gain access to that data is also increasing, and hackers have some pretty sophisticated tools at their disposal to try to force their way into your data. They use a variety of tactics, including social engineering, brute force attacks and dictionary attacks, among others.
Passwords are not just vulnerable to external threats. They must be protected from internal threats as well. Have you ever written down a password on a piece of paper, and then thrown it in the garbage? Have you ever discarded an old hard drive without destroying it? If this information gets in the wrong hands, it can lead to severe financial loss for a company, and damage to its reputation.
Passwords and usernames belong to one of three types of identification data:
Something you know
Something you own
Something you are or do (such as a fingerprint or other biometric element)
Passwords and usernames fall within the category of “something you know.” The three items listed above are considered factors of authentication, so when only one type of data is used to log into a system (such as a username and password), you are using a single factor of authentication.
Passwords alone are often not enough to protect your data against increasingly sophisticated attacks. Requiring a second factor of authentication can drastically reduce data theft.
Two-factor authentication is not a new concept. In fact, most of us already use it in other ways besides accessing our email. Here are some examples of two-factor authentication that many of us already use daily:
An ATM card (something you own) and a PIN (something you know)
A credit card (something you own) and a zip code (something you know)
A phone (something you own) and a fingerprint (something you are)
MDaemon includes two-factor authentication for WorldClient, MDaemon’s webmail client. With two-factor authentication, users must provide two forms of authentication – a password and a unique verification code that is obtained via any client that supports Google Authenticator (available in the Google Play store).
Two-factor authentication has many benefits:
It provides an extra layer of defense when a password isn’t strong enough.
It reduces online identity theft, phishing, and other techniques because a victim’s password isn’t enough to gain access to his or her data.
It helps companies in finance, health care, and other industries comply with PCI, HIPAA and other regulations.
It makes working remotely safer.
In this video, we demonstrate how to enable and use two-factor authentication in MDaemon and WorldClient.
If you’re concerned about privacy and security, two-factor authentication provides extra protection for your data. Download the latest version of MDaemon to take advantage of this extra security!
SecurityGateway provides businesses with additional layers of email security for their mail server. Developed with over 20 years of email security expertise, SecurityGateway is loaded with anti-spam, anti-abuse, and anti-malware features, as well as email encryption, data leak prevention, and more. With our latest release, SecurityGateway 5.0, businesses can benefit from the following new features.
Block Traffic from Specific Countries with Location Screening
Location Screening, a feature that was also recently introduced in MDaemon, allows administrators to block email from specific countries. This is useful if you don’t have users in certain regions. By default, all email traffic is blocked, but if you prefer to only block authentication attempts from these regions, you can simply check the box to block these attempts.
Enhanced Compliance Options with Terms of Service Agreement
In order to assist administrators with compliance to laws such as the General Data Protection Regulation in the EU, administrators can now add a terms of service statement which must be accepted by the users each time they login.
Download Message in Readable Format from Within the Logs
When viewing the message logs, administrators can now download a message in EML format by clicking on a link in the log. These EML messages can then be viewed in various email clients.
If you have an email account (and in 2017, you probably have more than one), you are a target. More specifically, your email password is a target and a coveted prize for hackers. And let’s face it – hackers are not going away anytime soon. Because the barriers to entry are so low and the potential payoffs so large, hackers are more motivated than ever to try to steal your login credentials. As an MDaemon administrator, you are tasked with making sure your users use strong passwords, but here are a few things to consider when evaluating your password & security policies:
People often reuse passwords.
People tend to use the same password across multiple sites.
Hackers have access to a variety of password-generating tools that are freely available on the Internet.
Automated systems installed in botnets can crack complex passwords in a matter of minutes.
Password dictionaries reduce the effectiveness of password complexity policies.
To address these threats, MDaemon’s new Dynamic Screening features can be configured to track authentication failures for all protocols, including SMTP, POP, IMAP, WorldClient, and ActiveSync (among others). When a specified number of authentication attempts from a given IP address fail in a designated period of time, subsequent connections from the IP are blocked for a specified period of time. The affected email account can also be frozen – meaning the mailbox can collect mail, but the user cannot login to check email or send out email messages.
Watch our latest tutorial video to learn more!
In the event that a hacker or spammer still manages to guess an account’s password, MDaemon’s Account Hijack Detection feature will disable or freeze the account after a specific number of messages have been sent from an authenticated session in a given timeframe.
Do you have questions or comments? Let us know via the Comments section!
As I announced recently in this post, MDaemon 17.5 has been released, with new security and collaboration features. One feature that our users will find particularly useful is the new Location Screening feature, which allows administrators to block incoming connections from specific countries. When you consider the scale and widespread distribution of global threats, blocking connections by country can provide the following benefits:
It can reduce the amount of email traffic on the server, freeing up system resources.
It has the added benefit of reducing the amount of spam received.
New spam domains, email zombies & phishing sites pop up all over the world every day. In fact, Cyren’s World Threat Map displays a handy visual representation of newly-discovered threats in real-time.
So if you know your company does not do business with certain countries, you can add these locations to MDaemon’s Location Screening feature and stop all traffic from these countries.
In previous versions of MDaemon, the best way to block connections by country was to use the DNS-BL feature, but with MDaemon 17.5, a new, intuitive check-box screen was added. In this tutorial video, I show you how easy it is to configure Location Screening in MDaemon.
Do you have questions or feedback? If so, click on the “Leave a Comment” link under the title of this post & let us know!
In addition to all of the new security & collaboration enhancements introduced in MDaemon 17.5, our latest release of Outlook Connector adds additional control for administrators as well as configuration reporting for end users.
Allow or Block Certain Third-Party Outlook Add-ins to Improve Performance
With the wide variety of Outlook add-ins that users can install, one common challenge is making sure these add-ins don’t negatively impact Outlook performance. Beginning with MDaemon 17.5 and Outlook Connector 5.0, administrators can control which add-ins are enabled or disabled on client machines.
New Outlook Connector Features for End Users
Generate an Outlook Configuration Report to Assist with Support Requests
When submitting an Outlook Connector support request, it is helpful for our support staff to know as much as possible about the Outlook configuration settings on the client computer. Beginning with Outlook Connector 5.0, users can generate a configuration report containing information such as:
All Outlook Connector Profiles, including the email address plus the location and size of the local cache file
Information about when the Outlook Connector database was last compacted, and the size of the database
The current version of the Outlook Connector plug-in
In addition to these major updates, we’ve included various minor fixes & enhancements. More information can be found in the release notes, or if you can download our free trial to start using Outlook Connector today!
Our continued focus to make email safe and simple to use has resulted in some great new features in the most recent release of MDaemon 17.5. We’ve highlighted some of the features for email administrators and end users below. So, let’s have a closer look.
New MDaemon Features for Administrators
Stop Spam and Malware Sent from Specific Countries
Many email administrators want an easy way to block connections from specific countries that send spam and malware. New country screening settings allow administrators to block incoming SMTP, POP, and IMAP connections from designated countries. This benefits businesses by allowing them to block messages from countries with which they do not do business, and provides an extra layer of spam protection when certain countries are known sources of spam.
Prevent and Set Alerts When Hackers Try to Access Your Email
MDaemon’s new Dynamic Screening features can be configured to track authentication failures for all protocols, including SMTP, POP, IMAP, WorldClient, and ActiveSync (among others). After receiving a specified number of failed authentication attempts from a given IP address in a designated period of time, subsequent connections from the IP are blocked for a specified period of time. This helps prevent further connection attempts and password guessing by hackers & spammers.
If you’re looking for the previous dynamic screening settings, they are still located under the Security Settings screen, but this screen has been renamed to SMTP Screen.
Flexible Filtering to Manage Messages
Administrators can set multiple IMAP filtering parameters based on the message size or the contents of any message header, and perform actions such as moving, deleting, forwarding, or redirecting the message.
Improving Server-Side Encryption Key Exchange
An option has been added that allows the process of exchanging public keys for OpenPGP to take place during the SMTP message delivery process. When this feature is enabled, authorized users will no longer need to manually send their public key to another user from whom they wish to receive encrypted email.
Improved Message Search Capabilities
A new Message Search page has been added to MDaemon Remote Administration, allowing administrators to search a single user’s messages based on keywords in the sender, recipient, subject, or attachment name. Searches can be performed on all messages, or only messages within a specified date range.
New MDaemon Features for End Users
Flexible Search Filters for Inbox Management
Improved search filters have been added to MDaemon’s web-based email (WorldClient) allowing users to specify filtering rules based on the message size or any message header. Message results based upon the filter criteria can be moved to another folder, deleted, forwarded, or redirected.
Custom Buddy List Groups for Instant Messaging
WorldClient Instant Messenger users can now arrange their buddy lists into custom groups.
Adding Attachments to Calendars, Contacts, Tasks and Notes
Attachments can now be added to calendar items, contacts, tasks, and notes via WorldClient, Outlook (using Outlook Connector) or your favorite CalDAV or CardDAV client. When scheduling a meeting, attachments added to calendar events will be sent to all meeting attendees.
Import and Export Groups/Distribution Lists to/from a Contact Folder
WorldClient users can now import and export groups/distribution lists to & from their Contacts folders. The ability to import groups allows users to avoid the extra steps needed to add group members individually.
Using Email Voice Memos
WorldClient’s new voice recorder allows users to record voice memos and attach them to email messages, save them to their WorldClient Documents folder, or save them to the desktop.
Simplified Folder Management Options
WorldClient users can now perform the following folder management tasks without having to go to the Options | Folders menu:
Move folders from one parent folder to another via drag & drop.
Add folders to Favorites via drag & drop.
Rename folders in the Favorites list by clicking on the folder name.
Show folders by type in the LookOut theme (previously only available in the WorldClient theme).
Export a Contact in vCard 4.0 Format
WorldClient users can now export individual contacts in VCard format, a file format standard for electronic business cards supported by a wide variety of email clients. VCards contain various details about a contact, including name, company name, email address, postal address, phone number, and additional comments. They can be downloaded locally or sent to a designated email address, and then imported into any email client that supports the VCard format.
Password Protected Chat Rooms
For added security, WorldClient Instant Messenger users can now chat with others via password protected chat rooms. When creating a new chat room via the WorldClient Instant Messenger application, simply enter the password that is required to join in the new Password field.
In addition to all of this, other improvements include:
By default, messages that cannot be scanned by SecurityPlus are quarantined. The antivirus quarantine exclusion settings have been improved. In previous versions, administrators could configure exclusions from antivirus scanning based on attachment file type. Now, administrators can also configure antivirus scanning exclusions based on the sender or recipient address.
When using the WorldClient theme, the look of WorldClient Notes has been updated. An option was added that allows users to change the color of the note by clicking on the note icon in the top left corner of the note.
When using the LookOut and WorldClient themes, WorldClient users can now search for attachment names using advanced search.
For more information please refer to the following resources:
Our hearts go out to all who have been impacted by hurricane Harvey. As a provider of email messaging software and services, we understand that many businesses have lost communications infrastructure, including their email services, which for many, are the primary channel of communication with customers. We want to help, so we are offering free, temporary email services for businesses who have experienced email disruptions due to Harvey.
Learn more about how we can help your business during this time of disruption: