Entries by Stefan Sturm

,

NoSpamProxy presents world novelty at it-sa

The new NoSpamProxy 12.3 already offers security against EFAIL even for communication partners with a weak infrastructure. Due to the far-reaching support of the new S/MIME 4.0 standard and Authenticated Encryption, many EFAIL-like attack methods are additionally neutralised. Numerous other improvements and new features ensure increased email security and increased resilience against the weaknesses of […]

How to send large files by email

Sending large attachments by email can cause problems because images, videos or large documents often exceed the maximum file size allowed. This is becoming increasingly problematic because more and more data is generated every day. Countless image and multimedia files created using smartphone cameras are proof of this. Research shows that the average size of […]

,

How to Identify Phishing Emails

In phishing emails, criminals sometimes pretend to be financial institutions, sometimes online shops, sometimes lottery organisations, and sometimes even your boss. Add to this a faithfully recreated email and website design, and suddenly there is a great danger of a successful phishing attack. So how is it possible to identify a phishing attack? With our […]

,

How to Protect Your Company from Phishing Attacks

Phishing emails enable scammers to capture relevant data from affected companies. Phishing attacks can be fended off by the possibilities of sender reputation management. Stefan Cink, NoSpamProxy product manager, explains how administrators can protect their company against phishing emails in an article released in the IT-Administrator magazine. 0.0 00

, ,

BMWi Survey on Encryption Singles Out Obstacles

The Digitale Strategie 2025 (Digital Strategy 2025) released by the Federal Office for Economic Affairs and Energy (BMWi) supports small and medium-sized businesses in improving data security. Tool-supported email encryption as an extension of conventional email servers is particularly mentioned as one of the required measures. In this regard, the Kompass für IT-Verschlüsselung (IT encryption […]