Business Email Compromise (BEC) is a scam through which criminals repeatedly manage to tap sensitive data or trigger financial transactions. Recurring dates such as the turn of the year or global events such as the Corona pandemic serve as a template for the fraudsters to get employees to transfer money to their account or disclose data. We explain why Business Email Compromise (BEC) is so dangerous and what you can do about it.
With the rapid development in the field of artificial intelligence, the field of IT security is facing great challenges: Like any new technology, artificial intelligence and so-called machine learning can be abused by criminals. What this means for the fight against phishing, ransomware and spam, and how you can already protect yourself against them, we explain in this blog article.
Criminals are always finding new ways to distribute malware, and the battle against attacks from the internet is continuously fought. Sometimes the good guys win, but no sooner is one threat defused than the next one pops up. Not only that: ransomware attacks are increasing dramatically. In the current case, the attacks are using XLL files, which are used to install malware on the victims’ computers. What XLL files are, why they are so dangerous and how NoSpamProxy protects you from this threat, you will learn in this blog article.
In the fifth part of our series on sender reputation, we explain how you can use DNS-based Authentication of Named Entities (DANE) to ensure the authenticity of certificates and protect your email traffic from access by criminals.
In the fourth part of our series of articles on sender reputation, we show you how you can use Domain-based Message Authentication, Reporting and Conformance (DMARC) to determine how the receiving server should authenticate your emails and what it should do if authentication fails. In addition, we explain how you can use DMARC to quickly be informed about abuse of your domain and thus protect the reputation of your domain.
Ensuring the authenticity of senders is therefore a crucial step in ensuring the security of your IT infrastructure. In part 3 of our series of articles on sender reputation, we show you how you can use DomainKeys Identified Mail (DKIM) to check the domain information of sender addresses and prevent spam and phishing attacks.
A joint offer from Bechtle and Net at Work supports hospitals from the application for funds to the ongoing operation. Net at Work grants all hospitals special conditions for public clients for procurements supported by KHZG funds, regardless of legal form and sponsorship.
SPF, DKIM, DMARC and ARC are essential technologies for the detection of fake sender domains as well as for the defence against phishing attacks. Part 2 of our series of articles on sender reputation focuses on a method to authorise specific IP addresses to send emails: Sender Policy Framework (SPF) is a simple and effective method to prevent the misuse of sender domains.