Have you spent months, or even years deciding on the perfect security stack for your clients? Has your team been painstakingly implementing best security practices across your estate to keep your customers safe and secure? One more question… Could all of your good work potentially be undone in seconds by an employee clicking a rogue link and welcoming a cyber-attack with open arms?

Unless you've somehow managed to avoid both the news headlines and the barrage of content from IT security vendors that followed, you'll no doubt be aware that a couple of weeks ago, there was a particularly severe ransomware attack that affected over 100,000 businesses around the globe, including the NHS. The latest evidence indicates that the recent 'WannaCry' attack originated via an exploit tool created by the NSA, however it's more common they originate via 'phishing' emails, the technique of tricking recipients into clicking a malicious link or opening an attachment, often appearing to be from a colleague or relative. So with this in mind, now seems like a great time to give you a refresher on the features at your disposal as an MDaemon administrator to help prevent the type of phishing attack that can lead to a ransomware infection, along with some additional tips on best practice. (Almost all of the security tools for MDaemon are in the SecurityPlus add-on so for the purpose of this post, I'll be assuming you've got that installed.)

While it'll probably never be 100% effective, the level of email security we have available to us today is less expensive and more effective than it's ever been. This may go some way to accounting for the recent rise, and added sophistication in phishing attacks as criminals choose to target the new weakest link, now located between the chair and keyboard.