Email security best practices

Protect your online communication from phishing attacks and shield your business from any malicious activity. What are the risks? E-mail is now considered a key tool of every business and at the same time an opportunity to cheat on e-scammers. We could distinguish the challenges of message security into two major categories. The first one deals with email scams that target the human … [Read more...]

End of Support: Windows 7, Server 2008 & 2008 R2

Microsoft Product Support Expires On January 14, 2020, support for Windows 7, as well as Windows Server 2008 and 2008 R2 will stop «End of Season» for Windows 7 Microsoft has begun to inform Windows 7 users that security upgrades will stop on January 14, 2020.If you continue to use Windows 7 after January 14, 2020, your computer will continue to work, but it will become more vulnerable to … [Read more...]

Let’s talk Emotet malware

You may have heard about Emotet in the news. What is it: Ancient Egyptian king, your teenage sister’s favorite emo band? We’re afraid not. The Emotet banking Trojan was first identified by security researchers in 2014. Emotet was originally designed as a banking malware that attempted to sneak onto your computer and steal sensitive and private information. Later versions of … [Read more...]

GFI Software warns on impending Halloween malware

The top 10 IT security threats seen during September, says GFI, included a fraudulent online storefront promising cheap HP Touchpads; poisoned search engine results targeting users searching on Yahoo and Bing; and spam promising a US green card to would-be immigrants. According to Chris Boyd (aka Paperghost), a senior threat researcher with the security firm, over the last month, … [Read more...]

Kerio Connect vs Microsoft Exchange

Organizations wishing to operate their own mail servers have a number of different mail server platforms that they can choose between. Two of the leading platforms available today are Microsoft Exchange Server 2019 and Kerio Connect from GFI Software. This article examines the similarities and differences between these two platforms. Organization Size Microsoft Exchange Server can … [Read more...]

Protecting your business from coinminers

Did you know that ESET research has shown that coinminers are the most commonly detected malware that ESET customers encounter? Research from ESET in 2018 revealed that coinminers were the most commonly detected malware that our customers encountered - but what is it and what does it mean for your business? Malicious cryptominers, or coinmining, is a type of malware designed to steal the … [Read more...]

Top Trends & Challenges: Shifting to the Cloud

Moving to the cloud can actually create as many challenges as it solves. This is especially true if a company’s goals for the cloud aren’t in keeping with what the cloud can accomplish. The cloud can do many things, but it isn’t magic. And expecting magic is a sure fire way to be disappointed. Here are some ways in which leaning towards the cloud tech can create some challenges for … [Read more...]

GFI EventsManager Is Here!

Monitoring security activity, mechanisms and applications. GFI EventsManager allows you to manage event log data for system realiability, security and availability and compliance. Read more here Download your trial version here … [Read more...]

SolarWinds MSP Announced as Service Provider of the Year for Second Year Running at IT Europa’s European IT & Software Excellence Awards 2018

2018 Award Driven by Highly Successful Customer Case Study, Featuring SolarWinds Backup DUNDEE, UK – May 2, 2018 – SolarWinds MSP, a global leader in delivering comprehensive, scalable IT service management solutions to IT solution providers and MSPs, has won Service Provider of the Year at the European IT & Software Excellence Awards 2018, sponsored by IT Europa, for the second year … [Read more...]

How to Encrypt your Email Messages from MDaemon Webmail in Three Easy Steps!

Source by: MDaemon technologies Whether you work in healthcare, finance, education, or another highly regulated industry, it’s likely that you’re required to meet increasingly stringent regulations on email security and privacy, such as the General Data Protection Regulation (GDPR). But even if these strict requirements do not apply to your industry, you still want to maintain customer trust by … [Read more...]