Email Security: 10 best practices
Do you need email security? Email has become an indispensable tool to communicate for many people. The shared data might be confidential, or not, but you have a right to decide to keep it private
Encryption is the answer.
Do you need email security? Email has become an indispensable tool to communicate for many people. The shared data might be confidential, or not, but you have a right to decide to keep it private
If you have read our posts related to social ingineering ploys (phishing, smishing, whaling and vishing), you already know that many kinds of scams are derived from phishing. But it’s important to learn about the
It is been more than a month now since Microsoft first acknowledged a data breach on its on-premises Microsoft Exchange Server. Attackers were able to get administrator privileges on affected servers, access to user emails
Pretexting attack is a specific kind of social engineering focused on creating a good pretext, or a fabricated scenario, that scammers can use to trick their victim into giving up on their own personal information.
We have taken many steps to protect our users from common attacks such as spoofing or phishing. However, such emails might still find their way to your inbox. While we do…
TLS is a protocol that encrypts traffic between a client program and the server. It also ensures that the software client is talking to the right server. Protocols are continuously being improved through the release
What happens when you would like to change the supplier that has your private email data on its servers? Is it possible to get your data back? In the following article, Mailfence will breakdown what
You probably know someone or have heard a really scary case of hacking or scamming. What you probably do not know however is that more than 80% of all successful cyber-security breaches begin with your
New vulnerabilities in many OpenPGP and S/MIME enabled email clients were announced on 2019-04-30. These signature spoofing vulnerabilities exploit weaknesses in the way OpenPGP signatures are verified by email clients and how the verification result