IT Security News & Blog

The Phishing Technique You Are Almost Certainly Vulnerable To
16 July 2019
In early 2017, the world was introduced to a form of domain spoofing which is almost impossible to spot with human eyes. Major internet browser vendors were quick to build capabilities which could detect these occurrences. However, when it came to email, most still lag behind today....
READ BLOG
Why Solely Relying on Office 365's Built-In Email Security is a Bad Idea
5 July 2019
We get it, you migrated to Office 365 and low and behold it has its own built in email security capability. Thats handy, no more need for a separate solution, Microsoft can handle it for you, right?...
READ BLOG
9 Simple Ways to Check Whether an Email is Fraudulent or Not
5 July 2019
Email fraud or using email as a mechanism for breach has been around for almost as long as the existence of email itself. From the moment of its creation, there have been those who seek to use it for nefarious purposes....
READ BLOG
WeTransfer Admit to Sending Customer's Files to Incorrect Recipients
24 June 2019
Today we heard some news which had passed relatively quietly through the usual media outlets, despite it being highly embarrassing for the cloud-based managed file transfer vendor WeTransfer....
READ BLOG
Axe the Fax: 5 Reasons Why MFT is the Best Replacement for Fax
8 January 2019
In July of 2018, it was revealed that there were over 9,000 fax machines still in use across the UK National Health service; and that purchases of the absurdly legacy equipment were still taking place. Leading to the UK government to request that fax usage be phased out across the health service, before the 31st of March 2020....
READ BLOG
4 Security Compromising File Transfer Mistakes You Are Probably Making
7 January 2019
Here at Advanced Cyber Solutions, we speak with customers and prospects about their file transfer activities and needs, almost every day of the year. After 8 years, certain identifiable patterns start to emerge, such as common requirements, challenges and areas which can be improved....
READ BLOG
How to Achieve the Highest Levels of Information Security with File Transfer
14 December 2018
For those exploring managed file transfer options, security is likely to be an important consideration. One that regulatory compliance and business best practices have made an imperative. In this blog, we explore Iswitch’s approach to security, and to detail the specific features included in their popular MOVEit managed file transfer solution....
READ BLOG
3 Ways in Which DMARC Gives Hawk-Like Visibility Over Email Domains
28 November 2018
Every so often, a technology or methodology emerges which could have potentially profound effects on an aspect of IT security globally. Sometimes they are embraced; and other times they cannot find traction with the IT teams of the world and remain shamefully obscure....
READ BLOG