It is important to protect your business from email-borne cyber threats. Abacus Technologies email security platform provides multiple layers of security and filtering. Stop Spam and Malware with Inbound Filtering Our email security platform quickly filters and sanitizes every email before it is delivered to your mail server to protect you from email-borne threats. Using… Read more »
Tag: Email Security
Cloud-Based Business Email Compromise Scams
The FBI’s Internet Crime Complaint Center (IC3) published an alert warning that criminals are exploiting cloud-based email services to carry out business email compromise (BEC) scams. The attackers are using phishing kits that impersonate email services like Google’s G Suite or Microsoft’s 365 to compromise corporate email accounts. Once they gain access to an account,… Read more »
Changes Coming to Authentication for Microsoft 365 Email Service
In late 2021, Microsoft 365 will no longer support legacy authentication. Modern authentication means OAuth 2.0, where applications request access tokens from Azure Active Directory rather than using username and password to connect. This enables multi-factor authentication, restrictive access policies, and other security beneficial features. In September 2019, Microsoft stated that from the October date,… Read more »
Netflix Scams Target People Sheltering in Place
Netflix scams are on the rise since people are sheltering in place for COVID-19. Google searches for Netflix jumped 142% since the advice to stay home became serious. Netflix-themed phishing campaigns are in progress against those who are keeping their social distance at home. The most prominent campaigns use fake sites that appear to be… Read more »
What You Need to Know About Email Security.
There are a variety of email-based attacks that you should be aware of to protect your company against. Hackers are using the full range of techniques to comprise your email security. Phishing, spear-phishing, whaling, business email compromise (BEC), CEO/CFO scamming, and employee impersonation. Most companies have few technical barriers to guard against these types of… Read more »