Subscribe To Our Blog

Your email:

Awards & Certifications

antispam, anti malware, anti phishing
anti spam, anti virus, anti phishing
WN Gold 120x701179739751459
vmware2
anti-spam, spam filter, business spam filter, anti malware

Web & SpamTitan Blog

Current Articles | RSS Feed RSS Feed

DNS 101 - How DNS helps and hurts your network security!

  
  
  
EMAIL SECURITY, ANTI SPAM

The Domain Name System (DNS) was established to make it easier to use the Internet. It translates domain names to the IP addresses used by network devices. DNS allows us to use http://www.google.com instead of  http://74.125.224.72/ to initiate a search. In short, it is the Internet's primary directory service. But DNS is a double-edged sword largely because of the insecure nature of the DNS infrastructure. Your DNS infrastructure can be threatened by attackers.

Using SpamTitan spam filtering with Microsoft Office 365 – the perfect fit!

  
  
  
anti spam, email filtering

Office 365 in the cloud has some great advantages. Microsoft manages the software updates, making it easier for the IT support services. You can collaborate in real time using different mobile devices and PCs.

Why cash-strapped SMBs must make smart network security decisions.

  
  
  
netowrk security, anti phishing

To a cash-strapped SMB, security seems like a frill, not a necessity. But an incursion can be lethal to a firm’s survival. In a previous article, we discussed how SMBs can manage IT just like the big guys using best practices. This article considers measures that can make the biggest difference to an SMB’s security posture. Some of the strongest protections against hackers can be common sense actions that protect from threats at little or no cost.

Secure Internet Habits, Do's & Don'ts - Cybersecurity 101

  
  
  
internet security, anti spam, web filtering

To complete our series on secure internet habits this article look at some practical Internet Do's and Dont's. Some of these may seem basic and common sense but reminding users of the basics can often avert an unnecessary security event.

The anti-spam cheat sheet: 11 spam filtering essentials!

  
  
  
email security, anti spam

No matter what email server or spam filter you’re using, there are a few quick and easy things you can do to reduce spam and related malware attacks on your network.

Basics of LDAP – Introduction to Key Components & Concepts

  
  
  
ldap, email security, anti spam

Want to be more productive and make your life easier?. That's what this System Administrators Guide to LDAP is all about. If you already understand what LDAP is, what it’s used for and the specific vocabulary of LDAP that's great, you may still find this article useful. Here we present a  brief introduction to LDAP for system administrators and programmers - if you’ve ever been concerned in the past about any aspect of LDAP, this article is for you!

Email Scam Fools Financial Controller to the Tune of $17 Million.

  
  
  
email security, anti spam, web security

Network security technology continues to improve, minimizing technical attack surfaces. But one attack surface is not shrinking fast enough. Cybercriminals are shifting their focus to take advantage of careless user behavior with  email phishing campaigns to launch targeted attacks.

Security Tips & Advice on Safe Internet Browsing Habits for your Organisation

  
  
  
EMAIL SECURITY, WEB SECURITY, BROWSER SECURITY

If there is one item that pretty much everyone is familiar with on the Internet, it's the very thing we use to browse it: the Web Browser. Whether you use Firefox, Chrome, Safari, on a Desktop or Mobile device, this article concerns you. How you use a Web Browser has implications about your security posture and any information that you handle.

Best Firewall Security Zone Segmentation for Optimal Network Security.

  
  
  
network security, email security

Hardware firewalls are the cornerstone of network security for almost all TCP/IP networks. From SOHO and SMB networks, up to big Enterprise environments, the network firewall provides the basic defense against attacks to I.T systems and digital information assets.

Fakes, Frauds and Phishing – How Fake LinkedIn Contact Requests are Used to Fuel Attacks!

  
  
  
email security, network security

As one of the most popular professional online networks, LinkedIn is being used by scammers to amass data for future phishing and identity theft type attacks. Once the data is collected the scammers then either infect your computer with malicious software or steal your personal information. One common scam is an email inviting you to connect with another LinkedIn member where their account is in fact fake. 

All Posts