The latest version of MDaemon Email Server is now available, for detailed information about what’s new in this new version, please go here.
One of the most overlooked areas of email security is your own domain reputation. Unlike most email security solutions, Reputation is focused on you as the sender’s ability to send email to recipients and to stop spammers from spoofing you and claiming to send email as your domain.
We’ve received a notification from the MDaemon Development Team that they’ve issued a critical patch to correct a potential vulnerability in MDaemon Remote Administration and Webmail (Worldclient).Continue reading
One of the more recent and often somewhat overlooked security features within MDaemon is Location Screening. This can be viewed as an IP level firewall but one that is blocking IPs based on their country of origin.
For many years now its been common place for users to need access to their business email, calendars and contacts on their mobile devices. Over the years there have been different ways to achieve this, but by far the easiest to setup and the option with best support for access from any connection is ActiveSync.
One of the biggest concerns when changing email platform is how can you migrate all your users existing email, calendar and contacts data over without having to ask each user to backup and restore there own data via their email client.
In this blog article I want to introduce the ‘MDaemon ActiveSync Migration Client’ that makes the process of moving multiple mailboxes from any other ActiveSync capable server over to MDaemon a much easier task. Continue reading
There is a new release of MDaemon, Version 19.5.1 please see below for the list of Special Considerations and Changes before installing this update.
If you have any questions about this release please feel free to contact us on email@example.com Continue reading
Managing your overheads.
It’s just one of the endless art forms you need to master when you take the decision to become the owner of a small business.
In an ideal world, your IT expenses at least, would all be handled by a wonderfully competent outsourced IT support firm. Failing that, a trusted team of dedicated IT staff.
In my experience of the size of companies we tend to work with, it’s quite possible you’re not in possession of either of those things, and that can bump IT-related decisions down the priority order occasionally.
Cybercrime. Isn’t it just the gift that the keeps on giving?
Picture the scene…
You’re about to catch a flight, the final boarding call is but minutes away and you remember an email you absolutely had to get sent before take off.
Plucking your laptop from the post luggage check cable spaghetti, you perch in the lounge, successfully connect to the free wifi and hammer out your email masterpiece.
As you don the noise cancelling headphones and breathe a sigh of relief, you’re blissfully unaware that the chap in the lounge you’d assumed was buried in a spreadsheet, was actually running the data ‘sniffing’ software Wireshark.
Not many minutes later, you’re at 30,000 feet and he’s walking away with everything he needs to send email as you, and to view the sensitive contents of your messages (take a look at this video to see just how easy it is!) and to cause havoc for your business.
Not a nice hypothetical.
So what can you do to prevent it happening for real?
Ah, the good old days of Windows ’98.
That period will, of course, stick in your mind for ‘Bootie Call’ by All Saints topping the charts, and the release of the undisputed king of phones, the Nokia 5110.
They were, however, magical times for another reason.
Our businesses weren’t under permanent attack.