Category: Vendor News

Patch Tuesday August 2020 fixes 120 vulnerabilities and two actively exploited zero-days

The second Tuesday of the month is upon us, and this translates to only one thing in the world of IT security: Patch Tuesday. Microsoft has released fixes to address 120 vulnerabilities, with 17 of them being Critical. With most of the workforce adopting remote work, IT admins are going to have a challenging time […]

5 tips to avoid cyberattacks on EdTech platforms

As the COVID-19 pandemic rages on, many educational institutions have been forced to shift their on-campus classes to online classes. Various EdTech platforms have also launched free classes that have prompted students to try their hands on digital education. With more students turning to online learning than ever, these platforms have emerged as a lucrative […]

[Heads Up] Apparently Slack Phishing Got So Bad They Had To Do Something About It

Slack has announced a slew of new security features, certificates and integrations, including a verification system that adds an additional layer to protect against phishing scams. The announcement follows on from Slack Connect, launched in June, which allows organizations to create shared channels with other companies. This is the company’s big play in its attempt […]

Paying the Ransom After a Ransomware Attack May Become More Complicated, Thanks to the U.S. Treasury

With many organizations considering to pay the ransom should they experience an attack, new guidance from the U.S. Treasury may put a damper on an organization’s ability to pay. When hit with a modern ransomware attack today, the idea of paying the ransom has been brought back into the spotlight due to multiple ransomware variants […]

Archiving Emails in Microsoft Office 365

Did you know that even Microsoft Office 365 customers aren’t automatically protected against data loss? Businesses therefore need to take action themselves if they want to preserve their emails in the long term. An email archiving solution can be a key component when it comes to protecting and retaining business-critical emails in the long term. […]

Email Archiving vs. Backups – The Critical Differences

Despite the availability of many other communication tools, the email remains the most important means of communication for companies around the world. But are companies really always aware that their emails can contain business-critical data that need to be preserved and kept available in the long term? Email compliance regulations are constantly growing and so […]

Email Archiving for G Suite with MailStore Server

Conversations with our customers have led us to conclude that cloud-based services are becoming increasingly important to the IT environments of many mid-size companies. Figures confirm this trend: A Bitkom study revealed that 54 percent of small and mid-sized German enterprises are already using cloud-based storage databases, computing power, and software. “Globally operating companies such […]

MailStore V13: Improved Support of Cloud Services and Modern Authentication

Like many other companies, the MailStore team has spent several weeks working from home during the first half of the year, diligently developing our archiving solutions in the process. The team’s success is underlined by today’s release of MailStore Version 13, which we’d like to present to you now. With several new features and numerous […]

Explosion of Zoom Meeting Phishing Attacks Over Spring and Summer of 2020 and Targeting Office365 and Outlook Credentials

Researchers at INKY have observed an “explosion” of Zoom-themed phishing attacks over the Spring and Summer of 2020. Most of the attacks are aimed at stealing credentials to services like Outlook and Office 365 by directing users to spoofed login pages. The researchers say they’ve observed the emails being sent from legitimate, compromised accounts as […]

Five Reasons Why Ransomware Attacks Should Be Your Biggest Worry and Aren’t Going Anywhere

No other cyberattack has evolved like ransomware. Today’s attacks are more pervasive, invasive, impactful, damaging, and costly. Learn why and what to do about it. Unless you’ve been hiding under a rock, you can’t go online to any tech news without bumping into a ransomware story. This cyberattack method has gone from nuisance, to a […]