How important do companies consider securing their own email inboxes? Where do companies see an acute need for action in terms of email security? And to whom do they entrust the operation of email security? As part of a study by techconsult, decision-makers or people significantly involved in the decision-making process were surveyed. Download the results now.
New features such as S/MIME 4 support, metadata service 32Guards and Flow Guard, and new web app offer the best protection for email communication and set the bar high for the competition. Learn more about all the exciting new features in NoSpamProxy 14!
The Spam Confidence Level (SCL) is decisive in the evaluation of emails. In the end, the SCL value decides whether an email is declared as spam. How does SCL work?
The public authority mailbox beBPo is considered a secure transmission channel for electronic communication. Find out how to use it with NoSpamProxy.
The use of a suitable secure email gateway is the basic prerequisite for confidential and secure electronic communication. Especially if you can trust the software, its origin as well as the technology used. But how can you as a customer or user be sure that you can? Well – in this case, it’s quite simple.
Since April 2019, there is a new type of attacks that use emails as an attack vector: the so-called Email Reply Chain Attacks. The first step in these attacks is to spy on emails. The responses to these emails written by the criminals contain a malicious link or attachment. While this method was initially used on a larger scale by Emotet, other threats such as QakBot (aka Qbot or also Quackbot) have also been added over time.
For several years, spammers have increasingly used text-based HTML attachments to spread malicious code. A double-click in the browser is enough to execute malicious code that is either embedded in the HTML document or reloaded via external web servers.
Email encryption is the basis for data protection and legal security in your company. Encryption is no longer a marginal topic for organizations, and that’s a good thing: Rising threats from espionage and automated email screening by intelligence agencies show how important it is to protect your communications. In addition, encrypted communication with suppliers or external service providers is a prerequisite for awarding contracts in many industries. Until now, the email certificates required for encryption required administrative effort to acquire, distribute and manage. With Managed Certificates, you automate certificate management and reduce the effort to a minimum.
NoSpamProxy
Categories
Latest News
- What is a Zero-Day Exploit?23.04.2025 - 14:00
- UPDATE: New Google email sender guidelines: What you need to do17.04.2025 - 12:00
- What is spoofing?11.04.2025 - 14:00