dcsimg

How to Stay Safe from Office Macro-Based Malware with Email Security  

<p>Microsoft Office macros have been spreading malware since the late '90s, ranging from Melissa to well-known ransomware applications such as Locky or the Dridex banking malware. However, as users learned how to combat these threats, this type of attack fell out of favor with hackers.&nbsp;</p> Read More … [Read more...]

Are Your Mobile Devices Making You Vulnerable to Email Threats?

<p>In our previous blog we covered <a href="https://www.solarwindsmsp.com/blog/top-social-engineering-techniques-tr…; target="_blank">Top Social Engineering Techniques Trending on Email</a>. We continue to see that email remains the number one attack vector for businesses. According to a study by 451 Research, email security is the biggest problem we’re not paying … [Read more...]

Best Practices SIEM: Educational Series Part 1

<p>Security has become a critical part of daily life, requiring constant focus on protection to safeguard intellectual property and business data. The ever-evolving cyberthreat landscape requires businesses to put sophisticated cybersecurity defenses in place to help keep the bad guys out. But what do these defenses look like and how should managed services providers (MSPs) deploy advanced … [Read more...]

Top Social Engineering Techniques Trending on Email 

<p>We all know the famous saying, “email is the number one attack vector.” Is this still true? Unfortunately, yes. The tool we use daily and that businesses rely on to get their jobs done, remains the number one attack vector and one of the easiest targets for social engineering attacks<sup>i</sup>. Social engineering continues to be at the forefront of all attacks that target … [Read more...]

Top Social Engineering Techniques Trending on Email 

<p>We all know the famous saying, “email is the number one attack vector.” Is this still true? Unfortunately, yes. The tool we use daily and that businesses rely on to get their jobs done, remains the number one attack vector and one of the easiest targets for social engineering attacks<sup>i</sup>. Social engineering continues to be at the forefront of all attacks that target … [Read more...]

Compliance is Not a Synonym for Security

<p>For many businesses, regulatory compliance is a big part of their daily operations. Terms like HIPAA, PCI DSS, SOX, NERC, and CIP are now widely recognized, as are the list of standards and processes organizations need to have in place to protect, store, and process information.&nbsp;</p> Read More … [Read more...]

Compliance is Not a Synonym for Security

<p>For many businesses, regulatory compliance is a big part of their daily operations. Terms like HIPAA, PCI DSS, SOX, NERC, and CIP are now widely recognized, as are the list of standards and processes organizations need to have in place to protect, store, and process information.&nbsp;</p> Read More … [Read more...]

Build a Powerful Security Offering with Managed Email Security

<p>Cybercriminals LOVE email—it’s easy access. And bad actors are increasingly targeting SMBs because they often don’t have the resources to adequately protect themselves—according to the Ponemon Institute,<b> </b><a href="https://start.keeper.io/2018-ponemon-report " target="_blank">67% of SMBs have faced a cyberattack</a>. … [Read more...]

Partnering—The Way to Win with SIEM and SOC Without Breaking the Bank

<p>According to Symantec, <a href="https://www.symantec.com/security-center/threat-report&quot; target="_blank">58% of cyberattacks target small and-medium sized businesses</a> (SMBs); the Federation of Small Businesses (FSB) reported that SMBs in the UK alone “<a href="https://www.fsb.org.uk/media-centre/press-releases/small-firms-suffer-c…; Read More … [Read more...]

Protecting Your IP and Company Reputation 

<p>Email is a service that customers always expect to work, seamlessly. But have you experienced your email traffic being blocked due to IP blacklisting? Or have you had to deal with chasing fraudulent accounts and getting your IP addresses off blacklists? If not, chances are you may still have to at some point given the growing problems with spam.&nbsp;</p> Read More … [Read more...]