Tag: email security

Email threat types: Domain Impersonation
Domain impersonation, also known as typosquatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate domains, such as Barracudamsp.com, by creating domains that appear similar. Such a domain might be accessed by a user typing the...

Email threat types: Data exfiltration
Data exfiltration, sometimes referred to as data theft, is the unauthorized transfer of data from your computer, network, or other devices. The stolen data is transferred from the victim to a control server or some other device that is controlled...

Email threat types: Malware
Email attacks often come in the form of a harmless-looking email with malware attached as a .zip file or embedded in an email attachment. This malware could install ransomware, spyware, and other damaging programs. Malware is short for ‘malicious software’ and...

Fake news needs real tools
As a journalist, I’m often at the forefront of covering major news stories, whether it be a court case or a tornado. The proliferation of “fake news” however, has become a significant issue to the reporting profession. Not only has...

Protecting remote workers from COVID-19 phishing attacks
Q: One of our customers’ remote workers recently clicked a phishing link. While we were able to prevent the attack from ultimately being successful, this is quite concerning, especially since remote workers are not within a secured network. How can...

Beware as COVID-19 is bringing out spammers and scammers
I was going through one of my email accounts the other day and I noticed a bunch of 1990s-style spam emails. There was the promise of sharing some uncollected inheritance with me from some deceased African royalty if I only...

Webinar: How many advanced threats are hiding in your inbox?
As an MSP, you know that email security is getting more important every day because ransomware and other advanced threats are on the rise. According to a report from Verizon, 92.4 percent of all malware attacks are delivered through email....

Threat Spotlight: Coronavirus-related phishing
As much of the world grapples with the new coronavirus, COVID-19, and how to handle it, attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web. Barracuda researchers have seen a steady increase in...

Coronavirus fraud: companies face new phishing attacks
As Coronavirus COVID-19 makes its way across the world, individuals are doing their best to stay up-to-date on the latest outbreak locations and confirmed cases. Hackers have created new attacks based on the public interest in this virus.

AI-based security helps MSP alleviate email security pain
Based in Powell, Ohio, TTG is a seasoned voice, data, and mobile managed services provider, dedicated to improving the ecosystem of its customers’ communication, data, and network security infrastructure. The company’s telecom experts provide infrastructure connectivity, planning, installation, and maintenance...