Why your mail server needs another security layer

Why your mail server needs another security layer

Email is the backbone of business communication, but it also poses significant risks with the rise of cyber threats. While traditional email security solutions are common, adding a real-time security layer to your mail server is crucial in defending against advanced threats like phishing, ransomware, and zero-day attacks. Introduction In today’s digital landscape, safeguarding sensitive […]

Making smarter triage decisions when handling network abuse

Making smarter triage decisions when handling network abuse

We often wonder how Network Providers (ISPs and hosting providers) can best triage abuse reports and focus on appropriate reports to keep their networks as safe as possible.  This question arises since we have helped many organizations deal with network and copyright abuse problems. As a result, when considering new triage approaches, we often ask […]

Five tricks you can learn from the Big Email providers

Five tricks you can learn from the Big Email providers

As email remains the top threat vector for cyberattacks, Enterprises, and smaller email security providers must stay ahead of the curve.  Large mailbox providers like Gmail, Microsoft, and Yahoo have successfully kept their users’ emails secure.  Here are five tricks that you  can learn from them: By adopting these tricks, you can improve their overall […]

Why Should You Care About a Clean (IP/Network) Reputation?

Why Should You Care About a Clean (IP/Network) Reputation?

A clean public network is essential for ISPs and hosting companies to protect their services from threats and maintain a good reputation. This involves taking proactive steps to monitor and address any abuse coming from public network space and taking preventive measures to avoid abuse in the first place. Additionally, it is essential to have […]

What external reporters should I use?

What external reporters should I use?

What external reporters should I subscribe to for my Abuse Desk? We often hear this question from abuse desk operators protecting their public networks and mailbox provider postmasters since Network security is a priority for service providers. Since the needs are a little different for the two different roles, the requirements are slightly different, so the order […]

What is a blocklist, and Why Do You Need One?

Imagine you are next in line to enter a club and finally start to party. Woohoo! 🥳But a big muscled bouncer needs to allow you to enter the club. You look suspicious and a troublemaker.  Well, a blocklist, also known as a blacklist, is like a bouncer at the club but for your email inbox. […]

Are blocklists suitable for your organization?

Are blocklists suitable for your organization?

Who should use an email blocklist? Generally, anyone who runs an on-premises mail server or uses a single-tenant third-party cloud email service can benefit from blocklists. These blocklists can react quickly to reject unsafe messages, reducing time spent identifying new threats and minimizing processing overhead. They can also help identify compromised users and other abuse […]

On-Prem vs. Cloud Mail Server: Differences and Benefits

On-Prem vs. Cloud Mail Server: Differences and Benefits

The internet has enabled businesses to utilize cloud services, including hosting mail servers.   When making a decision, we need to consider the following : On-Prem Mail Servers With the increasing popularity of cloud-based services and the ease of access, many businesses are considering running their mail server in the cloud.  However, there are still numerous […]

Why a Welcome List (whitelist) is as important as a Blocklist

Why a Welcome List (whitelist) is as important as a Blocklist

A “welcome list” is a list of IPs & domains that would only be blocked under exceptional circumstances.   That isn’t to say that these IPs and domains don’t ever send bad mail, but just that they’re run by legitimate entities. And so, blocking them outright would cause significant false positives. Also Read: Why changing the […]

The Comprehensive Guide to Cloud Security

The Comprehensive Guide to Cloud Security

Over the last two decades, a large amount of computing has transitioned to the cloud. This transition is still ongoing today, with Public clouds, private clouds, and hybrid clouds bringing unprecedented agility.  Large and small organizations have adopted various cloud platforms and applications as a mainstay of their infrastructure, bringing: When choosing a cloud service, here’s what you should […]

Why is rsync not necessary for your blocklist?

The short answer is that a  DNS query is always faster in reporting new threats than rsync, regardless of whose service you use. Its simple DNS query makes your email users more secure. But before diving in, let’s start with the basics. What are Blocklists and Rsync? Abusix Mail Intelligence is a set of email […]

12 Questions to choose the right Blocklist (Blacklist) for your Network

12 Questions to choose the right Blocklist for your Network

When looking at your mail server configuration or blocklist tools like mxtoolbox.com, multirbl.valli.org you may notice the big number of blocklists (email blacklists) that exist.  Some lists you may recognize as commercial vendors, but others you may never have heard of before, like free projects or specialized lists. So you may ask yourself: “Why should […]

Is Phishing Illegal & How Can it Affect Businesses?

Is Phishing Illegal & How Can it Affect Businesses?

When an email attempts to trick recipients into believing an email is from your company and acts on a lure, it’s called phishing.Phishing is a problem for not only the recipient but also your company! The FTC has long advised consumers about steps to avoid phishing scams. But what should your business do if customers […]

How to Stop a DDoS Attack

How to Stop DDoS Attacks

DDoS attacks are becoming more frequent Statistics show around 50 million DDoS (distributed denial of service) attacks occur every year and are growing. Attacks are becoming more complex and often strike different parts of networks simultaneously.   Today, botnets are pervasive, giving cybercriminals a massive advantage to conduct massive attacks. Thus, cybercriminals challenge society, financial systems, […]

How Spear Phishing Differs From Traditional Phishing Attacks

How Spear Phishing Differs From Traditional Phishing Attacks

Phishing has become a greater and greater hazard to individuals and businesses each year.  According to a 2019 Verizon report, 90% of confirmed spear-phishing email attacks occurred in environments that used Secure Email Gateways (SEGs), so don’t ever take the danger for granted. While most phishing messages are delivered by email and are not personalized […]

The Definitive Guide to DDoS Attacks

DDoS attacks are rising, as more and more vulnerabilities are discovered and machines are compromised.  As they spread, it is important for a network administrator to understand what they are, and how to address them when they come.  Because they will come, it’s only a matter of time. What is a DDoS attack? Denial-of-service (DoS) […]