Why we’re partnering with Twilio SendGrid for security and deliverability

Twilio SendGrid and Valimail have teamed up to provide customers with Valimail’s DMARC Monitor and Enforce solutions, which will help Twilio SendGrid customers further protect their domains from phishing and impersonation attacks. Valimail is alr… Continue reading Why we’re partnering with Twilio SendGrid for security and deliverability

IDG Contributor Network: How CIOs can avoid the next ransomware attack

No question about it, ransomware is on the rise, and the majority of enterprises remain vulnerable to inbound phish emails that often are the originators of ransomware attacks.

One recent ransomware outbreak, Petya, appears to have originated in the Ukraine. Like WannaCry before it, once it has infected a computer it attempts to spread through local area networks. But according to the Romanian national CERT (Computer Emergency Readiness Team) Petya’s initial point of entry is often a phishing email that contains a Trojan-horse document which, if opened, will infect the target computer. “Initial infection of systems is achieved through documents attached to phishing email messages that users are urged to open,” according to the Romanian publication Business Review.

To read this article in full or to leave a comment, please click here

Continue reading IDG Contributor Network: How CIOs can avoid the next ransomware attack

Posted in Uncategorized

IDG Contributor Network: After a cyberattack, companies remain vulnerable. What CIOs can do to protect their brands

Here’s a security scenario that’s all too common: A company suffers from a cyberattack, then responds to it promptly and alerts its customers, warning them to change their passwords. But the company remains vulnerable through the very means it uses to alert those customers: Email. In fact, attackers can exploit that vulnerability using email that pretends to be a security warning from the company, targeting customers and wreaking even more damage.

For example, on May 31, popular cloud-based password manager OneLogin announced that it had suffered a serious security breach, and it updated its report the next day with a few more details.

To read this article in full or to leave a comment, please click here

Continue reading IDG Contributor Network: After a cyberattack, companies remain vulnerable. What CIOs can do to protect their brands

Posted in Uncategorized

IDG Contributor Network: To stop future ransomware hacks, CIOs first need to ‘swat the mosquitoes’

Recent coverage of the latest ransomware and phishing attacks makes one thing clear: You’ve got to keep your operating system up to date. But that recommendation, while important, may not get to the root of the problem.

Making sure you’ve got the latest Windows updates prevents the spread of ransomware such as WannaCry, after it’s already infiltrated your company. But it may not prevent you from getting the malicious code on your computer in the first place. 

To read this article in full or to leave a comment, please click here

Continue reading IDG Contributor Network: To stop future ransomware hacks, CIOs first need to ‘swat the mosquitoes’

Posted in Uncategorized

IDG Contributor Network: How CIOs can fight the rise in shadow email

One feature of today’s cloud-centric landscape is just how many different services may be sending email on your company’s behalf, even when email does not appear to be their primary function.

We call this “shadow email,” because these emails are going out (potentially exposing your company to risk and liability) without any awareness or oversight by the CIO, CSO or IT teams. Like shadow IT, shadow email lurks in the dark corners of your domain.

I’ve worked with dozens of companies to help them discover and manage their shadow email services, and I have yet to encounter a CIO who wasn’t surprised by the sheer volume of cloud services that were sending email on their behalf—sometimes dozens of them.

To read this article in full or to leave a comment, please click here

Continue reading IDG Contributor Network: How CIOs can fight the rise in shadow email

Posted in Uncategorized