Jul 8, 2024
Views: 78

Is Your Law Firm's Confidentiality at Risk?
The Importance of Email Encryption for Lawyers

Akshatha Srinivas

Introduction: In the labyrinth of legal proceedings, where every word carries weight and every document holds significance, safeguarding confidentiality is paramount. Yet, in the age of digital communication, where emails cross cyberspace at lightning sp ...

Mar 7, 2024
Views: 359

Troubleshooting Emails when sending messages to Gmail

Hong Gu Yoon

When running an email server, it is very important to make sure your server is properly configured. Failure to do so will result in your IP address being blacklisted, which can result in email delivery failures. If you are having issues sending outbound e ...

Feb 15, 2024
Views: 243

What makes a good spam filter solution?

Hong Gu Yoon

Emails, especially for small businesses and large companies, are an important key for communication. With the increasing amount of emails being sent and received every day, the abundance of spam messages has become a huge problem. Spam interferes with com ...

Feb 12, 2024
Views: 353

Next-Gen Cyber Defense: AI-Powered Strategies Against Spear Phishing Threats in 2024, 2025, and Beyond

Akshatha S

It's no secret that in today's tech-savvy world, cyber threats are becoming increasingly sophisticated and dangerous. Even with advanced security measures in place, human error still plays a major role in many data breaches. One particularly insidious tac ...

Jan 8, 2024
Views: 4027

The Importance of a PTR Record

Hong Gu Yoon

SMTP, or Simple Mail Transfer Protocol, is a protocol used for sending and relaying messages over networks. SMTP defines rules and conventions for how email messages should be transferred and submitted. When implementing an in-house-SMTP server, so ...

Nov 13, 2023
Views: 395

How to prevent large PST files in Exchange

Hong Gu Yoon

It's important for companies to make sure email messages are flowing in and out smoothly. The greater the amount of emails received in your email server, the greater the disk space will be used. In Exchange, users' mailboxes are saved in a PST file. These ...

May 11, 2021
Views: 3436

What Are The Different Types of End-to-End Email Encryption?

Imran Hussain

Electronic mail has been around since 1978 and is being used by billions of users on a daily basis. Privacy was not a big concern when it was introduced, and therefore, it lacks the essential security features necessary for private communication ...

May 7, 2021
Views: 2401

How to Spot IRS Email Scams

Blake Cohen

There are many scammers out there that try impersonating the IRS to fool unsuspecting victims into sending money or sensitive financial documents to them. Many of these are through phishing emails. Sending any information to these scammers could res ...

Jan 18, 2021
Views: 3626

Alternative to SpamAssassin

Hong Gu Yoon

Alternative to SpamAssassin SpamAssassin is a free and open source spam filtering solution. It helps block many emails by using a scoring system. When an email comes in, SpamAssassin uses rules to see if the filter matches. The total score will det ...

Nov 29, 2020
Views: 4063

Alternative to Postfix

Hong Gu Yoon

When it comes to email servers, there are benefits to hosting a in-house email server. These advantages include having full control of your server as well as having privacy where no third party will have access to your emails. There are numerous in-ho ...

Nov 18, 2020
Views: 3674

Alternative to Barracuda Spam Filter

Blake Cohen

Today alone, the average office worker will receive over 120 emails, of which, over 50% will be considered spam messages. Sifting through dozens of junk messages can be a pain when you need to respond to emails to conduct business. This is precise ...

Oct 8, 2020
Views: 2896

How to be HIPAA Compliant with Emails

Hong Gu Yoon

HIPAA and Emails Working in the medical field requires you to be in constant, quick contact with not you’re your colleagues but patients as well. Emails are quick, efficient, and accessible to everyone. However, while sending both personal and priv ...

Sep 14, 2020
Views: 3920

How to Monitor Secure Logins

Hong Gu Yoon

As an administrator, it's crucial for all of your users to make sure they are connected securely. Data being compromised is no joke; sensitive information such as credit card, social security, tax return numbers and even passwords are exchanged throug ...

Sep 2, 2020
Views: 5822

Preventing Hackers From Stealing Passwords

Imran Hussain

Intruders enter through available doors. The more doors you have the more cautious you need to be to ensure no one can steal the identities of your users. In technical terms, these doors are analogous to servers listening for clients to connect. A typ ...

Sep 6, 2019
Views: 6044

Tricky Spam Emails

Blake Cohen

Phishing emails are a common occurance where malicious senders will attempt to steal your personal information or passwords by pretending to be a trusted sender. Typically, you would receive an email that appeared to come from a trusted sender, suc ...

Jun 29, 2018
Views: 459858

Introducing SynRBL

Hong Gu Yoon

There are many methods of catching spam emails. Some of these methods include; content filters which inspect the message content to determine if a message is junk or not, Bayesian filters that calculate the probability of a message being spam based o ...

May 31, 2017
Views: 350606

Step-by-step guide to Install ClamAV & Integrate with Xeams

Mudit Bhatt

What is ClamAV?ClamAV includes a number of utilities: a command-line scanner, automatic database updater and a scalable multi-threaded daemon, running on an anti-virus engine. ClamAV includes a multi-threaded scanning daemon, command line utilities for on ...

Jan 5, 2017
Views: 8909

Importance of rejecting invalid email addresses

Imran Hussain

There are two schools of thought when it comes to accepting emails sent to invalid addresses in an SMTP server: Reject the message without accepting it Accept an incoming message and then generate an NDR (non-delivery report) This difference ...

Jan 5, 2017
Views: 82121

Steps to run email server in 10 minutes

Mudit Bhatt

Follow these steps to run your own email server in 10 minutes. Step 1: Domain Name Get a domain name for yourself or your business. This can be done by visiting http://godaddy.com ( or another registrar of your choice). We will assume that your domain n ...

May 18, 2016
Views: 161064

What is a Reverse NDR Attack

Hong Gu Yoon

The non-delivery report (NDR) is generated when an email message is not able to be sent to the next hop. Spammers can use NDR as a method to generate spam towards victims by using the victim's email address as the sender. This is called a reverse NDR ...