The Phishing Technique You Are Almost Certainly Vulnerable To

The Phishing Technique You Are Almost Certainly Vulnerable To

In early 2017, the world was introduced to a form of domain spoofing which is almost impossible to spot with human eyes. Major internet browser vendors were quick to build capabilities which could detect these occurrences. However, when it came to email, most still lag behind today.

Why Relying on Office 365's Built-In Email Security is a Bad Idea

Why Relying on Office 365's Built-In Email Security is a Bad Idea

We get it, you migrated to Office 365 and low and behold it has its own built in email security capability. Thats handy, no more need for a separate solution, Microsoft can handle it for you, right?

9 Simple Ways to Check Whether an Email is Fraudulent or Not

9 Simple Ways to Check Whether an Email is Fraudulent or Not

Email fraud or using email as a mechanism for breach has been around for almost as long as the existence of email itself. From the moment of its creation, there have been those who seek to use it for nefarious purposes.

WeTransfer Sent Customer's Files to Incorrect Recipients

WeTransfer Sent Customer's Files to Incorrect Recipients

Today we heard some news which had passed relatively quietly through the usual media outlets, despite it being highly embarrassing for the cloud-based managed file transfer vendor WeTransfer.

5 Reasons Why MFT is the Best Replacement for Fax

5 Reasons Why MFT is the Best Replacement for Fax

In July of 2018, it was revealed that there were over 9,000 fax machines still in use across the UK National Health service; and that purchases of the absurdly legacy equipment were still taking place. Leading to the UK government to request that fax usage be phased out across the health service, before the 31st of March 2020.

4 Managed File Transfer Mistakes You Are Probably Making

4 Managed File Transfer Mistakes You Are Probably Making

Here at Advanced Cyber Solutions, we speak with customers and prospects about their file transfer activities and needs, almost every day of the year. After 8 years, certain identifiable patterns start to emerge, such as common requirements, challenges and areas which can be improved.

Achieve High Levels of Information Security with File Transfer

Achieve High Levels of Information Security with File Transfer

For those exploring managed file transfer options, security is likely to be an important consideration. One that regulatory compliance and business best practices have made an imperative. In this blog, we explore Iswitch’s approach to security, and to detail the specific features included in their popular MOVEit managed file transfer solution.

3 Ways DMARC Gives Hawk-Like Visibility Over Email Domains

3 Ways DMARC Gives Hawk-Like Visibility Over Email Domains

Every so often, a technology or methodology emerges which could have potentially profound effects on an aspect of IT security globally. Sometimes they are embraced; and other times they cannot find traction with the IT teams of the world and remain shamefully obscure.