<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vircom | Email Security Experts</title>
	<atom:link href="https://www.vircom.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vircom.com</link>
	<description>Passionate techies securing businesses for their tranquility with proven best products covered with obsessive service and deep expertise.</description>
	<lastBuildDate>Fri, 07 Jun 2019 16:45:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.4.1</generator>
	<item>
		<title>Vircom launches new modusCloud Alerts Portal for modusCloud and Proofpoint Essentials!</title>
		<link>https://www.vircom.com/blog/vircom-launches-new-moduscloud-alerts-portal/</link>
					<comments>https://www.vircom.com/blog/vircom-launches-new-moduscloud-alerts-portal/#respond</comments>
		
		<dc:creator><![CDATA[Yves Lacombe]]></dc:creator>
		<pubDate>Fri, 07 Jun 2019 14:33:53 +0000</pubDate>
				<category><![CDATA[General Cybersecurity]]></category>
		<category><![CDATA[modusCloud]]></category>
		<category><![CDATA[Proofpoint Essentials]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email security]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[managed service providers]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[proofpoint]]></category>
		<category><![CDATA[proofpoint essentials]]></category>
		<category><![CDATA[vircom]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18874</guid>

					<description><![CDATA[<p>Partners, Managed Service Providers and Customers rejoice! Vircom today launches its all-new modusCloud Alerts Portal for modusCloud and Proofpoint Essentials. The new tool is a strong step forward in proactive email security and protection. Admins using the modusCloud Alerts Portal can now set Security and Business alerts to find out if noteworthy actionable events have<br /><a href="https://www.vircom.com/blog/vircom-launches-new-moduscloud-alerts-portal/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/vircom-launches-new-moduscloud-alerts-portal/">Vircom launches new modusCloud Alerts Portal for modusCloud and Proofpoint Essentials!</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Partners, Managed Service Providers and Customers rejoice! Vircom today launches its all-new modusCloud Alerts Portal for modusCloud and Proofpoint Essentials. The new tool is a strong step forward in proactive email security and protection. Admins using the modusCloud Alerts Portal can now set Security and Business alerts to find out if noteworthy actionable events have occurred on their modusCloud or Proofpoint Essentials deployments.</p>
<p>“We’re thrilled to offer this value-added tool and integration for our customers, partners and MSPs,” says Mike Petsalis, CEO of Vircom. “This is another step forward in our focus on making life a little easier for those who are on the front lines of protecting corporate email from advanced threats, ransomware, email fraud and phishing attacks. This is of crucial importance in the face of all the cyber threats constantly barrelling their way towards SMBs across North America, Europe and worldwide, and something we intend to do our best in protecting against. Vircom has always been about end user serenity, so that employees can focus on their own work and business.”</p>
<p>“With this in hand, management is made easier and efficiency increases, allowing MSPs, partners and customer IT Managers/Administrators to better realize the true benefits of modusCloud’s advanced protection against phishing, malware, ransomware and email fraud, along with continuity, encryption, DLP and powerful cloud-based archiving for email, all with the service, expertise and support that has distinguished Vircom’s brand for more than two decades.&#8221;</p>
<h3><strong>Security Alerts</strong></h3>
<p>Admins can find out if system configuration is opening unecessary security holes in the deployment or if system or user behavior is unusual or risky.</p>
<p>In this version of the modusCloud Alerts Portal the following Security alerts can be set:</p>
<ul>
<li>SPF configuration issue</li>
<li>Domain included in DNSBL (or RBL) list(s)</li>
<li>Possible spam wave detected</li>
<li>Possible compromised account detected</li>
<li>Inadvisable trusted sender domains including self-trusting</li>
</ul>
<p>&nbsp;</p>
<p><img class=" wp-image-18883 aligncenter" src="https://www.vircom.com/wp-content/uploads/SecurityAlerts-mCP-1.1_full-300x162.png" alt="" width="527" height="285" srcset="https://www.vircom.com/wp-content/uploads/SecurityAlerts-mCP-1.1_full-300x162.png 300w, https://www.vircom.com/wp-content/uploads/SecurityAlerts-mCP-1.1_full-768x415.png 768w, https://www.vircom.com/wp-content/uploads/SecurityAlerts-mCP-1.1_full-1024x553.png 1024w, https://www.vircom.com/wp-content/uploads/SecurityAlerts-mCP-1.1_full.png 1536w, https://www.vircom.com/wp-content/uploads/SecurityAlerts-mCP-1.1_full.png 1680w" sizes="(max-width: 527px) 100vw, 527px" /></p>
<p>&nbsp;</p>
<h3><strong>Business Alerts</strong></h3>
<p>Business Alerts are targetted for partners, resellers and Managed Service Providers (MSPs). Admins can find out if anything significant has changed with their customers from a business perspective. Having this information allows Admins to be proactive and contact their customers and further help and inform.</p>
<p>In this version of the modusCloud Alerts Portal the following Business alerts can be set:</p>
<ul>
<li>Package Change on a domain</li>
<li>Trial Expiration</li>
<li>Change in MX record</li>
<li>Significant change in customer usage (including exceeding license count)</li>
</ul>
<p>&nbsp;</p>
<p><img class=" wp-image-18885 aligncenter" src="https://www.vircom.com/wp-content/uploads/BusinessAlerts-mCP-1.1_full-300x162.png" alt="" width="530" height="286" srcset="https://www.vircom.com/wp-content/uploads/BusinessAlerts-mCP-1.1_full-300x162.png 300w, https://www.vircom.com/wp-content/uploads/BusinessAlerts-mCP-1.1_full-768x415.png 768w, https://www.vircom.com/wp-content/uploads/BusinessAlerts-mCP-1.1_full-1024x553.png 1024w, https://www.vircom.com/wp-content/uploads/BusinessAlerts-mCP-1.1_full.png 1536w, https://www.vircom.com/wp-content/uploads/BusinessAlerts-mCP-1.1_full.png 1680w" sizes="(max-width: 530px) 100vw, 530px" /></p>
<p>&nbsp;</p>
<h3><strong>Setting Up Alerts</strong></h3>
<p>Admins can set up which Security and Business alerts they would like to see and be notified about. They can also choose the email address to which the Alerts Digest (see below Alerts Digest) will be sent.</p>
<p>&nbsp;</p>
<p><img class=" wp-image-18884 aligncenter" src="https://www.vircom.com/wp-content/uploads/AlertSettings-mCP-1.1_full-300x162.png" alt="" width="530" height="286" srcset="https://www.vircom.com/wp-content/uploads/AlertSettings-mCP-1.1_full-300x162.png 300w, https://www.vircom.com/wp-content/uploads/AlertSettings-mCP-1.1_full-768x415.png 768w, https://www.vircom.com/wp-content/uploads/AlertSettings-mCP-1.1_full-1024x553.png 1024w, https://www.vircom.com/wp-content/uploads/AlertSettings-mCP-1.1_full.png 1536w, https://www.vircom.com/wp-content/uploads/AlertSettings-mCP-1.1_full.png 1680w" sizes="(max-width: 530px) 100vw, 530px" /></p>
<h3></h3>
<h3><strong>Alerts Digest</strong></h3>
<p>A daily Alerts Digest is sent to an admin email address. It contains a summary of all the alerts, and detail about more critical alerts.</p>
<p>&nbsp;</p>
<p><img class=" wp-image-18886 aligncenter" src="https://www.vircom.com/wp-content/uploads/Digest-mCP-1.1-300x168.png" alt="" width="530" height="297" srcset="https://www.vircom.com/wp-content/uploads/Digest-mCP-1.1-300x168.png 300w, https://www.vircom.com/wp-content/uploads/Digest-mCP-1.1-768x430.png 768w, https://www.vircom.com/wp-content/uploads/Digest-mCP-1.1-1024x574.png 1024w, https://www.vircom.com/wp-content/uploads/Digest-mCP-1.1.png 1417w" sizes="(max-width: 530px) 100vw, 530px" /></p>
<h3><strong>Alerts Dashboard</strong></h3>
<p>The Alerts Dashboard gives a quick visual look at the alerts state of the deployment. It offers easy to use clickable drill-down if an admin wants to view a specific alert in more detail.</p>
<p>&nbsp;</p>
<p><img class=" wp-image-18882 aligncenter" src="https://www.vircom.com/wp-content/uploads/Dashboard-mCP-1.1_full-300x162.png" alt="" width="530" height="286" srcset="https://www.vircom.com/wp-content/uploads/Dashboard-mCP-1.1_full-300x162.png 300w, https://www.vircom.com/wp-content/uploads/Dashboard-mCP-1.1_full-768x415.png 768w, https://www.vircom.com/wp-content/uploads/Dashboard-mCP-1.1_full-1024x553.png 1024w, https://www.vircom.com/wp-content/uploads/Dashboard-mCP-1.1_full.png 1536w, https://www.vircom.com/wp-content/uploads/Dashboard-mCP-1.1_full.png 1680w" sizes="(max-width: 530px) 100vw, 530px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Download the datasheet <a href="https://www.vircom.com/collateral/modusCloud-Alerts-Portal-Datasheet.pdf">here</a> to learn more! If you are a new customer interested in using the modusCloud Alerts Portal on modusCloud or Proofpoint Essentials, then simply <a href="https://www.vircom.com/contact/">contact us</a> or <a href="https://www.vircom.com/free-trial/">provision your modusCloud account</a> to get started and discover the power and efficiency that this new tool provides! If you are an existing Vircom customer  using modusCloud or Proofpoint Essentials, then you already have access to <a href="https://moduscloudportal.com/">login to the modusCloud Alerts Portal </a>and start setting up the alerts you want to see.</p>
<p><em>Learn more about the new <a href="https://www.vircom.com/moduscloud-alerts-portal/">modusCloud Alerts Portal.</a> </em></p>
<p><em>Learn more about <a href="https://www.vircom.com/moduscloud-cloud-email-security/">modusCloud Email Security</a>.</em></p>
<p><em> </em></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/vircom-launches-new-moduscloud-alerts-portal/">Vircom launches new modusCloud Alerts Portal for modusCloud and Proofpoint Essentials!</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/vircom-launches-new-moduscloud-alerts-portal/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Someone is spoofing my email! Was I hacked?</title>
		<link>https://www.vircom.com/blog/someone-is-spoofing-my-email-was-i-hacked/</link>
					<comments>https://www.vircom.com/blog/someone-is-spoofing-my-email-was-i-hacked/#respond</comments>
		
		<dc:creator><![CDATA[Marc Chouinard]]></dc:creator>
		<pubDate>Mon, 04 Mar 2019 22:05:20 +0000</pubDate>
				<category><![CDATA[Attachment Defense]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Cybersecurity Awareness and Training]]></category>
		<category><![CDATA[Email and Domain Spoofing]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18851</guid>

					<description><![CDATA[<p>Someone is spoofing your email address. They are pretending to be you (email spoofing) in the hopes of phishing unsuspecting users and distributing malware to them. You are receiving complaints from people in companies you have never heard of, telling you to stop sending them viruses, malware and spam. Angry admins are asking you to<br /><a href="https://www.vircom.com/blog/someone-is-spoofing-my-email-was-i-hacked/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/someone-is-spoofing-my-email-was-i-hacked/">Someone is spoofing my email! Was I hacked?</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Someone is spoofing your email address. They are pretending to be you (email spoofing) in the hopes of phishing unsuspecting users and distributing malware to them. You are receiving complaints from people in companies you have never heard of, telling you to stop sending them viruses, malware and spam. Angry admins are asking you to beef up your security settings.</p>
<p>You probably have a million questions going on in your head when this happens. Panic is often a normal part of the reaction.  Calm is best though, as most spoofing cases aren’t because your account has been hacked.  Let’s clarify the difference between “hacked/compromised” and “infected” as it pertains to someone spoofing your email address.</p>
<p><strong>Hacked</strong>: Your real email account has been compromised. A malevolent third party has full access to your account. They somehow successfully retrieved your password, gained access to your systems beyond your email, possibly took over an open web session, etc.  They can send emails from your account so traffic will look legitimate and technically <em>be</em> legitimate by all normal criteria of authenticity.</p>
<p><strong>Infected</strong>: You (or one of your friends, colleagues, contacts) has been infected by malware and your email history and/or address book (or theirs) has been stolen.  The criminals send emails <em>that seem to be </em>on your behalf but not directly from your email account. This is where the actual spoof comes along, as they have to disguise the email since they cannot send directly from your real account as would be the case if you had been hacked.</p>
<p>Most spoofing occurrences are due to an infected machine somewhere on your network or on one of your contact’s networks. These occurrences do not use your credentials to log into your account and send spam, they are only using your name and contact names to spoof your email address, using mail servers controlled for this pernicious purpose. If a hacker has your credentials, they can do a lot worse than just spoof your email and you’ve got bigger things to worry about.</p>
<h2>Business spoofing</h2>
<p>Businesses exchange emails with thousands of recipients. They often use generic email addresses such as support@domain or sales@domain, along with a formatted signature and detailed contact information.  One fine day, a colleague or a customer somewhere on the planet clicks on a malicious attachment, promising fortune or a health miracle, and is infected. This infection is like a tiny virtual spy that sifts through that user’s email history and contacts, using advanced algorithms to steal precious information. At this point the criminals will know the following about you:</p>
<ul>
<li>Your full name</li>
<li>Your email address</li>
<li>Whom you communicate with</li>
<li>What form your emails take when making such communications, down to your signature details</li>
</ul>
<p>All this information comes in very handy when they begin to pretend to be you by spoofing your email address. Here’s a reasonably well-done sample.</p>
<p>&nbsp;</p>
<p><img class=" wp-image-18853 aligncenter" src="https://www.vircom.com/wp-content/uploads/spoofing-1-300x175.jpg" alt="" width="525" height="306" srcset="https://www.vircom.com/wp-content/uploads/spoofing-1-300x175.jpg 300w, https://www.vircom.com/wp-content/uploads/spoofing-1-768x449.jpg 768w, https://www.vircom.com/wp-content/uploads/spoofing-1-1024x598.jpg 1024w, https://www.vircom.com/wp-content/uploads/spoofing-1.jpg 1525w" sizes="(max-width: 525px) 100vw, 525px" /></p>
<p>&nbsp;</p>
<p>This is when you might start sweating. The body text of the email is exactly the same as an email that you routinely send. While the FROM email address is far from being similar to the original one, the content is. The “stolen” signature is identical to the original one (including color and font). The message is urgent and usually requires immediate attention. It is key to inject a level of urgency to make the recipient act quickly without thinking. The attached file has a familiar name, the same name as a recent file attachment received from this account. The user that clicks will get infected by opening the file. Should they be suspicious and use the Reply-To email to respond, someone is listening on the other end and will respond that everything is ok.</p>
<p>And if your signature has an image embedded or a quote from someone famous? No problem! It only makes the copy created and used that much more reliable to the recipient and more capable of fooling them.</p>
<p>Here’s another example:</p>
<p>&nbsp;</p>
<p><img class=" wp-image-18854 aligncenter" src="https://www.vircom.com/wp-content/uploads/spoofing-2-300x175.jpg" alt="Email Spoofing Sample" width="534" height="312" srcset="https://www.vircom.com/wp-content/uploads/spoofing-2-300x175.jpg 300w, https://www.vircom.com/wp-content/uploads/spoofing-2-768x449.jpg 768w, https://www.vircom.com/wp-content/uploads/spoofing-2-1024x598.jpg 1024w, https://www.vircom.com/wp-content/uploads/spoofing-2.jpg 1525w" sizes="(max-width: 534px) 100vw, 534px" /></p>
<p>&nbsp;</p>
<p>The legitimate image was extracted from the infected user’s email history. The contact information is very similar compared to the original legitimate email that was copied and is meant to only be glanced at to reassure you. But this one contains a modified signature. The phone number does not actually work, so you cannot call and confirm the request.  The original attachment was “Quotation.iso”, a file installer, that has been removed by the email filter.</p>
<p>Votre entreprise opère en français et vous vous croyez à l’abri? Non, pas du tout. [Translation: You operate in a language other than English, for example, French, and you think you might be protected? Think again!]
<p>&nbsp;</p>
<p><img class="wp-image-18855 aligncenter" src="https://www.vircom.com/wp-content/uploads/spoofing-3-300x175.jpg" alt="Email Spoofing Sample" width="524" height="306" srcset="https://www.vircom.com/wp-content/uploads/spoofing-3-300x175.jpg 300w, https://www.vircom.com/wp-content/uploads/spoofing-3-768x449.jpg 768w, https://www.vircom.com/wp-content/uploads/spoofing-3-1024x598.jpg 1024w, https://www.vircom.com/wp-content/uploads/spoofing-3.jpg 1525w" sizes="(max-width: 524px) 100vw, 524px" /></p>
<p>&nbsp;</p>
<p>We have seen a huge uptick in French and Spanish spoofs. In this case, the sender and recipient know each other, increasing the risk for the recipient to be fooled by the fake. The copied content re-uses a mistake that the original sender had made (“bicoup” should be “beaucoup”). The spoofed email is even copying style.</p>
<h2>How can I fix this?</h2>
<p>In most cases of spoofing you have not been hacked. There is however an infection somewhere and it is probably off-site, i.e. not on your network. The spamming criminal can be using a random server anywhere on the planet to send emails, so there is not much you can do to act directly on the email exchange. There are a few things you can do to help legitimate mail servers and mail filtering tools worldwide make better decisions on whether email purported to be sent by you was actually sent by you. This is done by publishing properly formatted SPF, DKIM and DMARC records.</p>
<p><strong>SPF</strong> (Sender Policy Framework) would be the minimum. This is probably the most under-used email security feature of all. SPF informs email recipients from what IP ranges legitimate emails from your business will come. While this helps, it is not a miracle solution. If for example you are using Office 365 SPF, a spammer on Office 365 with a valid SPF record could pass the test even though they would be impersonating you. A <a href="https://www.vircom.com/blog/dont-rookie-know-spf-records/">well-configured email security solution will always check the SPF record</a> of the domain from which it has received an email and will reject emails sent from the wrong server.</p>
<p><strong>DKIM</strong> (DomainKeys Identified Mail) is a bit more complex but very effective. It adds a (hidden) signature to your email to prove that your business actually sent it. The authenticity is established using encryption and asymmetric keys. Many email providers support DKIM.</p>
<p><strong>DMARC</strong> (Domain Message Authentication Reporting and Conformance) is more complex, the larger the business the more complex it will be to implement. It combines the best of SPF and DKIM. DMARC allows a domain to publish whether it uses SPF and/or DKIM, and what to do with an email received from that domain that fails either test. While DMARC could be an excellent tool to protect against phishing, its adoption by the market has been underwhelming because of the high False Positives rates. The main reason for the False Positives is incorrectly set up records that result in rejection of what are for all intents and purposes legitimate emails. We’ve written before about it <a href="https://www.vircom.com/blog/dmarc-explained-dmarc-record-and-reports/">here</a>.</p>
<h2>Conclusion</h2>
<p>Spammers and scammers are going to extraordinary lengths to fool those that know you by sending emails pretending to be from you (spoofing). The cause of this is often a minor infection that didn’t even happen on your own network. You can protect yourself, your business and your reputation by adopting more advanced standards and protocols for your business email such as SPF, DKIM and DMARC.</p>
<p>Another thing you can do is use an <a href="https://www.vircom.com/moduscloud-cloud-email-security/">advanced and complete email security solution</a> that is backed by security experts whose pleasure it will be to set up your SPF, DKIM and DMARC correctly.</p>
<p>Other References on <a href="https://en.wikipedia.org/wiki/Sender_Policy_Framework">SPF</a>, <a href="https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail">DKIM</a> and <a href="https://en.wikipedia.org/wiki/DMARC">DMARC</a>.</p>
<p>&nbsp;</p>
<p>Photo by <a href="https://unsplash.com/photos/1LCzr14Ah5U?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Greg Ortega</a> on <a href="https://unsplash.com/search/photos/impersonator?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/someone-is-spoofing-my-email-was-i-hacked/">Someone is spoofing my email! Was I hacked?</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/someone-is-spoofing-my-email-was-i-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improving cybersecurity for business: 12 actions with the best bang for the buck</title>
		<link>https://www.vircom.com/blog/improving-cybersecurity-for-business-12-actions-with-the-best-bang-for-the-buck/</link>
					<comments>https://www.vircom.com/blog/improving-cybersecurity-for-business-12-actions-with-the-best-bang-for-the-buck/#respond</comments>
		
		<dc:creator><![CDATA[Mike Petsalis]]></dc:creator>
		<pubDate>Thu, 21 Feb 2019 17:37:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18837</guid>

					<description><![CDATA[<p>There are days when protecting your business from threats will feel like a never-ending battle. Some of the cybersecurity measures you will take and recommend to others will come at high cost, while others might come at lower cost but with considerable effort attached. And then, there&#8217;s those special few measures that will make a<br /><a href="https://www.vircom.com/blog/improving-cybersecurity-for-business-12-actions-with-the-best-bang-for-the-buck/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/improving-cybersecurity-for-business-12-actions-with-the-best-bang-for-the-buck/">Improving cybersecurity for business: 12 actions with the best bang for the buck</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are days when protecting your business from threats will feel like a never-ending battle. Some of the cybersecurity measures you will take and recommend to others will come at high cost, while others might come at lower cost but with considerable effort attached. And then, there&#8217;s those special few measures that will make a significant difference in your company&#8217;s security posture, without breaking the bank or putting undue strain on your already stretched out resources.</p>
<p>In no particular order, here are a list of cybersecurity measures that will improve your company&#8217;s security while providing significant ROI for the effort or cost. Apologies in advance to those who consider such a list as subscribing to the silver bullet or magic pill theory. There is clearly no such thing. If you think you can only use one of the actions below, then you have already failed. Adopt them all and you will be well on your way to better protecting your business and being prepared to react when things go wrong. (N.B. They already have gone wrong, see #10 below)</p>
<h3>1. Limit the distribution and usage of admin accounts</h3>
<p>The proverbial sorcerer&#8217;s apprentice situation, those accounts have a lot of power and should not be bandied about or shared without extreme caution. Hackers have so many ways to get in, but if they get access to an admin account, then the havoc they can wreak is nearly limitless. Side benefit: by limiting access to these accounts you also avoid those painful self-inflicted wounds, where a novice admin takes out a network segment because they weren&#8217;t sure what they were doing. A corrolary to this of course is <a href="https://en.wikipedia.org/wiki/Principle_of_least_privilege">&#8216;least privilege&#8217;</a>: accounts should have the absolute minimal amount of privilege required to perform the basic functions required of the account.</p>
<h3>2. Adopt a cybersecurity framework such as the one from NIST</h3>
<p>A huge amount of collective wisdom and experience has gone into the development of these frameworks, including <a href="https://www.nist.gov/cyberframework">the one from the NIST</a>. You can save yourself literally years of learning by following the structure and steps, and further identifying where your organization lies in cybersecurity maturity.</p>
<p>Some industries enforce the usage of industry-related frameworks such as PCI, HIPAA and so on. It goes without saying that if your business is in such an industry or a combination of industries, then you should ensure you adhere to those frameworks.</p>
<h3>3. Monitor your DNS logs</h3>
<p>Come on, that&#8217;s so old school &#8230; not! A treasure trove of information for the paranoid, DNS logs give you foundational information on who is doing what, connecting to whom, at what time/date. Just don&#8217;t get carried away. You can even go a step deeper and implement trusted DNS and go as far as blacklisting specific countries. Your company doesn&#8217;t do business in Afghanistan and isn&#8217;t opening a branch office in the Ukraine? Then there&#8217;s no reason for you to be accepting any connections from those countries.</p>
<h3>4. It is time for a Password Manager (and a password policy)</h3>
<p>Sure, <a href="https://www.vircom.com/blog/strong-memorable-password-3-steps/">there are ways to create easy to remember but complex passwords</a> that are different for each account and application. But using a good password manager is the right way to do it for a business. There are so many good password managers out there and cost is from low all the way to free. Get your users to understand that having and using a password manager is just the way businesses must operate today. Also, no point in using a password manager if it doesn&#8217;t include a core policy for creating difficult (ie long) passwords.</p>
<h3>5. Inventory</h3>
<p>Oh man, this is going to be painful the very first time you undertake it! But then it gets easier, like brushing your teeth every day, it will become a daily/weekly operational habit that will require very little incremental effort and offer a lot of value. Why? Because you can&#8217;t protect what you don&#8217;t know you have. Servers, data, devices, applications, licenses, everything, you need to know what you have and where it is. A nice side effect of the inventory effort is that you will find all the unsupported or end-of-life software running on your network and will purge it. Another side effect is that you will find some security applications you thought were running that aren&#8217;t running at all or they&#8217;re not running to their full capability. (Admission: we&#8217;ve had that happen&#8230;).</p>
<h3>6. Think &#8216;cui bono&#8217; when analysing risks and threats</h3>
<p>We are not talking about nuisance hacking or ransomware and the like, where criminals spread malware casting a very wide net to catch a large number of small fish. If you have very valuable data or information to protect, think first who would really benefit (&#8216;cui bono&#8217;) from targeting an attack on your business to exfiltrate that information and use it or sell it. A fancier way of saying this would have been to mention <a href="https://en.wikipedia.org/wiki/Threat_model">threat modeling</a>.</p>
<h3>7. People over tools</h3>
<p>No, this one isn&#8217;t about user training (although that is important, see #12 below). There are a lot of very expensive highly specialized tools out there that will check a lot of boxes and satisfy the C-suite and investors that you are doing something. But there are also very useful and credible open source tools that can be very useful, when managed by skilled experienced individuals. Get the right people first, they will know what to do and can get along quite well with less expensive tools. And keep those people happy, motivated, challenged and informed, because there are numerous employment opportunities out there for them.</p>
<h3>8. Backup</h3>
<p>No explanation required. Ok, maybe just one: make sure you test your backups too!</p>
<h3>9. Take care of the very basics of security</h3>
<p>The usual perimeter and network stuff that go without saying, yet we&#8217;re saying it: anti-virus, email protection, firewall, automated patching and updating, turn logging on, harden systems, limit USBs, consider 2FA or MFA, VPN, etc.</p>
<h3>10. Change your mindset: you&#8217;ve already been breached</h3>
<p>Much cybersecurity thinking revolves around protecting, blocking, isolating, obfuscating and generally trying to create an impregnable fortress. Give it up! Ok, don&#8217;t give it up, but change your mindset to one of &#8216;you&#8217;ve already been breached&#8217;. This mindset quickly moves to data protection, rights management, asset classification, encryption and such. The bad guys are in, let&#8217;s make sure we can detect their presence or footprints, and also make it hard for them to find and use stuff.</p>
<h3>11. Watch those browsers</h3>
<p>Everybody has a favorite one and there are <a href="https://www.w3counter.com/globalstats.php">quite a few around</a>: Chrome, Firefox, IE (and Edge&#8230;), Opera, etc. Much of the trouble comes from those nasty plug-ins. A way to limit risk is to enforce a single hardened browser for business use, and limit which plug-ins can be used.</p>
<h3>12. Awareness and Training</h3>
<p>This is the biggest one of all! The most encouraging news is that we are making inroads into this, users are collectively getting more educated and more paranoid. Cybersecurity is not a single department&#8217;s problem, nor a single person&#8217;s problem, it&#8217;s everyone&#8217;s problem. Start with basic awareness, and keep things simple without freaking everyone out. Then progressively start some training and give it the time required. Avoid FUD, nobody learns well under stress. (Shameless Plug: we&#8217;ve put together <a href="https://www.emailsecurityawareness.com/">a site to help your users learn more about email security</a>, which is a big part of cybersecurity, since most attacks begin by email).</p>
<p>There you have it, we managed to get to 12 things you can do to improve your business&#8217; cyber security without breaking the bank or tapping too much more into your already over-stretched teams. Every little bit counts, every little bit helps. No single measure, action, person or tool can get it done on its own.</p>
<p>&nbsp;</p>
<p>Photo by <a href="https://unsplash.com/photos/M7v9MSZIOCY?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">William Daigneault</a> on <a href="https://unsplash.com/search/photos/good-value?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash.</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/improving-cybersecurity-for-business-12-actions-with-the-best-bang-for-the-buck/">Improving cybersecurity for business: 12 actions with the best bang for the buck</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/improving-cybersecurity-for-business-12-actions-with-the-best-bang-for-the-buck/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AppRiver and Zix: Are Price Increases and End-of-Life’s on the Horizon?</title>
		<link>https://www.vircom.com/blog/appriver-zix-price-increases-endoflife/</link>
					<comments>https://www.vircom.com/blog/appriver-zix-price-increases-endoflife/#respond</comments>
		
		<dc:creator><![CDATA[Mike Petsalis]]></dc:creator>
		<pubDate>Fri, 15 Feb 2019 21:00:00 +0000</pubDate>
				<category><![CDATA[Resellers]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18831</guid>

					<description><![CDATA[<p>You have to spend money to make money, and that’s certainly what Zix has in mind. The email encryption provider with a $300 million-plus market cap recently acquired AppRiver for $275 million. This acquisition was bolstered by an additional $100 million preferred equity commitment from True Wind Capital, a private equity firm, and a $200<br /><a href="https://www.vircom.com/blog/appriver-zix-price-increases-endoflife/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/appriver-zix-price-increases-endoflife/">AppRiver and Zix: Are Price Increases and End-of-Life’s on the Horizon?</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You have to spend money to make money, and that’s certainly what Zix has in mind. The email encryption provider with a $300 million-plus market cap recently <a href="https://www.crn.com/news/channel-programs/zix-buys-appriver-email-encryption-game-changer">acquired AppRiver for $275 million</a>. This acquisition was bolstered by an <a href="http://investor.zixcorp.com/news-releases/news-release-details/zix-acquire-appriver-leading-cloud-based-cybersecurity-solutions?field_nir_news_date_value%5Bmin%5D=2018">additional $100 million preferred equity commitment from True Wind Capital</a>, a private equity firm, and a $200 million debt commitment from additional banks and capital market commitments.</p>
<p>Mundane financial news an IT executive shouldn’t care about, right? Think again. If you are a Roaring Penguin, SpamStopsHere or AppRiver customer, this news will actually have a significant impact on you.</p>
<p><strong>Price Increases On The Way</strong></p>
<p>We’ve written about changes and consolidation in the industry before. There was <a href="https://www.vircom.com/blog/forcepoint-websense-partner-cull-what-you-need-to-know/">Forcepoint’s partner cull</a>  (dismissing those SMB 500-2000 user Websense partners), <a href="https://www.vircom.com/blog/barracuda-renewals-forcing-on-premise-customers-to-buy-atp/">Barracuda’s upsells on renewals</a> (after being bought by another private equity firm), and <a href="https://www.vircom.com/blog/mimecasts-pricing-increases-will-harm-msps-smbs/">Mimecast’s price increases</a>  (affecting MSPs). And of course <a href="https://www.channele2e.com/news/appriver-acquires-roaring-penguin-for-email-security-services/">AppRiver recently acquired Roaring Penguin</a> and turned to focus the combined offering and advantages of the deal on an MSP customer base.</p>
<p>The email security market is broad and distributed, with a multiplicity of providers, products and channel programs. This normally is great – great for competition and great for quality, along with delivering the best offering to customers and service providers.</p>
<p>Reality might be a little different. Private equity firms see this as an opportunity to leverage their power, join forces and consolidate channel programs. This gives customers fewer options, and allows providers to raise prices rather than producing real value or delivering innovations to said customers.</p>
<p>Thi pattern has been seen in many industries. Saas-type subscription-based businesses like email security are targets of private equity. The pattern: Acquire, Consolidate, Rationalize, Grow, then Sell. This is absolutely brilliant for making a lot of money for investors, which is what private equity is all about. On the other hand, gone are the twin visions of innovation in a complex industry and service to a customer base needing help and support.</p>
<p><strong>AppRiver Doubling Prices</strong></p>
<p>Why Zix would pay so much &#8211; almost the equivalent of its own market cap – to acquire AppRiver? On some level this could be about providing email security services, but if that were the case, what are we to make of Zix’s existing offering of SpamStopsHere since their <a href="https://www.businesswire.com/news/home/20170315006239/en/Zix-Acquires-Greenview-Data-Expand-Email-Security">acquisition of Greenview Data in early 2017</a>? Just like Roaring Penguin before it, expect Zix to benevolently neglect and soon End-Of-Life SpamStopsHere to <em>encourage </em>customers and partners to the newer more lucrative platform.</p>
<p>This acquisition isn’t about stopping spam, it’s about generating growth through AppRiver’s 4500 partners – something that is explicitly <a href="http://investor.zixcorp.com/static-files/2df1ce25-64e5-4df3-bd58-01c12912d60e">called out on the acquisition conference call</a> as a benefit of acquiring AppRiver. The methods here are multiple: sell Zix products to AppRiver partners, sell AppRiver products to Zix partners, and raise prices as high as those partners will bear to keep investors happy.</p>
<p>As the halls of <a href="https://www.reddit.com/r/msp/comments/ait9b2/appriver_doubles_their_price/?utm_source=reddit-android">r/msp would have it</a>, this process couldn’t have kicked off soon enough:</p>
<p><img class=" wp-image-18834 aligncenter" src="https://www.vircom.com/wp-content/uploads/appriver-1-300x41.png" alt="" width="695" height="95" srcset="https://www.vircom.com/wp-content/uploads/appriver-1-300x41.png 300w, https://www.vircom.com/wp-content/uploads/appriver-1-768x105.png 768w, https://www.vircom.com/wp-content/uploads/appriver-1.png 868w" sizes="(max-width: 695px) 100vw, 695px" /></p>
<p><img class=" wp-image-18835 aligncenter" src="https://www.vircom.com/wp-content/uploads/appriver-2-300x68.png" alt="" width="701" height="159" srcset="https://www.vircom.com/wp-content/uploads/appriver-2-300x68.png 300w, https://www.vircom.com/wp-content/uploads/appriver-2-768x174.png 768w, https://www.vircom.com/wp-content/uploads/appriver-2.png 854w" sizes="(max-width: 701px) 100vw, 701px" /></p>
<p>Life is tough when you’re a Bronze partner…</p>
<p>If you’re experiencing this price increase, you’re not alone. We found this rant really sums up the pain that customers and partners must be feeling at the hands of their vendors – first from a <a href="https://www.vircom.com/blog/solarwinds-msp-mail-assure-alternative/">SolarWinds MSP migration</a>, and then Roaring Penguin and AppRiver. Prices will be exorbitant no matter where they go and will not reflect the value received in return.</p>
<p><img class=" wp-image-18836 aligncenter" src="https://www.vircom.com/wp-content/uploads/appriver-3-300x132.png" alt="" width="686" height="302" srcset="https://www.vircom.com/wp-content/uploads/appriver-3-300x132.png 300w, https://www.vircom.com/wp-content/uploads/appriver-3-768x339.png 768w, https://www.vircom.com/wp-content/uploads/appriver-3-1024x451.png 1024w, https://www.vircom.com/wp-content/uploads/appriver-3.png 1116w" sizes="(max-width: 686px) 100vw, 686px" /></p>
<p>In this case, this service provider has gone from one product they like, was forced onto another, then left for a third, then was forced on another and is now confronted with a price increase, all of which they have to explain and pass on to their customers. Good service, easy management, decent margins, and a reliable product shouldn’t be so hard to find, as this other user seems to be wanting.</p>
<p><strong><img class=" wp-image-18833 aligncenter" src="https://www.vircom.com/wp-content/uploads/appriver-4-300x44.png" alt="" width="688" height="101" srcset="https://www.vircom.com/wp-content/uploads/appriver-4-300x44.png 300w, https://www.vircom.com/wp-content/uploads/appriver-4-768x113.png 768w, https://www.vircom.com/wp-content/uploads/appriver-4.png 826w" sizes="(max-width: 688px) 100vw, 688px" /></strong></p>
<p><strong>Why You Need to Make a Choice</strong></p>
<p>Every time you accept such a price increase as an MSP, you make it easier for companies like this to increase prices in the future, without offering you anything more in value. Companies like the new Zix-AppRiver combo – with a combined $167 million in annual revenue, 80,000+ total customers and healthy margins and growth – are producing those results by betting that they will earn more money by raising prices despite the customers they lose.</p>
<p>Don’t let private equity machinations pass the cost of an acquisition on to you. Consider <a href="https://www.vircom.com/moduscloud-cloud-email-security/">an alternative that you can rely on</a>.</p>
<p>&nbsp;</p>
<p>Photo by <a href="https://unsplash.com/photos/C2yH3zXzaP0?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Christiann Koepke</a> on <a href="https://unsplash.com/search/photos/squeeze?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/appriver-zix-price-increases-endoflife/">AppRiver and Zix: Are Price Increases and End-of-Life’s on the Horizon?</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/appriver-zix-price-increases-endoflife/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Vircom launches SpamReporter for modusCloud!</title>
		<link>https://www.vircom.com/blog/vircom-launches-spamreporter-moduscloud/</link>
					<comments>https://www.vircom.com/blog/vircom-launches-spamreporter-moduscloud/#respond</comments>
		
		<dc:creator><![CDATA[Rob Ravensbergen]]></dc:creator>
		<pubDate>Wed, 23 Jan 2019 15:37:52 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18822</guid>

					<description><![CDATA[<p>Vircom is pleased to announce the launch of its latest SpamReporter Outlook Plugin for modusCloud. With SpamReporter and modusCloud, organizations using Vircom’s leading cloud email security solution can now allow users to report spam on an individual basis and custom their Approved and Blocked Lists, further enabling flexibility and awareness of spam and email threats<br /><a href="https://www.vircom.com/blog/vircom-launches-spamreporter-moduscloud/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/vircom-launches-spamreporter-moduscloud/">Vircom launches SpamReporter for modusCloud!</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Vircom is pleased to announce the launch of its latest SpamReporter Outlook Plugin for modusCloud. With SpamReporter and modusCloud, organizations using Vircom’s leading cloud email security solution can now allow users to report spam on an individual basis and custom their Approved and Blocked Lists, further enabling flexibility and awareness of spam and email threats while maximizing productivity.</p>
<p>“These offerings are generally smaller and considered value-adds by most organizations,” says Mike Petsalis, CEO of Vircom, “but in reality this sort of functionality is rarely found on the market today, and surpasses the old mindset of keeping users uninvolved in their security by instead creating a direct sense of engagement with the Spam emails that do reach an inbox, while also allowing for adjustments to Approved and Blocked Lists that permit enhanced customization and comfort.”</p>
<p>Available free to all modusCloud users on all packages, SpamReporter’s high degree of usability and positive feedback are a sign that market-leading integrations can change the security conversation by no longer viewing users as a vulnerability or target of attack, and rather a first line of defense, vigilance and awareness when an organization has in fact entered a cyber criminal’s crosshairs.</p>
<p>&nbsp;</p>
<p><strong>Flexible Reporting Options</strong></p>
<p>SpamReporter enables emails to be marked as spam, while senders can also be added to a “trusted” or Block list, all with a simple right-click menu available directly in your Outlook client upon installation.</p>
<p><img class="aligncenter wp-image-18824" src="https://www.vircom.com/wp-content/uploads/SpamReporter-1-300x124.png" alt="" width="404" height="167" srcset="https://www.vircom.com/wp-content/uploads/SpamReporter-1-300x124.png 300w, https://www.vircom.com/wp-content/uploads/SpamReporter-1-768x317.png 768w, https://www.vircom.com/wp-content/uploads/SpamReporter-1-1024x422.png 1024w, https://www.vircom.com/wp-content/uploads/SpamReporter-1.png 1286w" sizes="(max-width: 404px) 100vw, 404px" /></p>
<p><img class="aligncenter wp-image-18825" src="https://www.vircom.com/wp-content/uploads/SpamReporter-2-195x300.png" alt="" width="291" height="448" srcset="https://www.vircom.com/wp-content/uploads/SpamReporter-2-195x300.png 195w, https://www.vircom.com/wp-content/uploads/SpamReporter-2.png 598w" sizes="(max-width: 291px) 100vw, 291px" /></p>
<p>&nbsp;</p>
<p><strong>Easy List Management</strong></p>
<p>With modusCloud’s Sender Lists Feature, users are able to review the choices they’re made with respect to Trusted and Blocked senders, further enhancing each users’ ability to use email efficiently.</p>
<p><img class="aligncenter wp-image-18827" src="https://www.vircom.com/wp-content/uploads/Sender-Lists-UI-300x172.png" alt="" width="699" height="401" srcset="https://www.vircom.com/wp-content/uploads/Sender-Lists-UI-300x172.png 300w, https://www.vircom.com/wp-content/uploads/Sender-Lists-UI-768x441.png 768w, https://www.vircom.com/wp-content/uploads/Sender-Lists-UI-1024x589.png 1024w, https://www.vircom.com/wp-content/uploads/Sender-Lists-UI.png 1536w, https://www.vircom.com/wp-content/uploads/Sender-Lists-UI.png 1919w" sizes="(max-width: 699px) 100vw, 699px" /></p>
<p><a href="https://www.vircom.com/contact/">Contact us</a> or <a href="https://www.vircom.com/free-trial/">provision your account</a> to get started and discover the power and efficiency that this new plugin provides!</p>
<p><em>Learn more about <a href="https://www.vircom.com/moduscloud-cloud-email-security/">modusCloud Cloud Email Security</a>, or <a href="http://www.globenewswire.com/news-release/2019/01/23/1704330/0/en/Vircom-launches-Next-Gen-SpamReporter-Plugin-for-modusCloud-Email-Security.html">view the press release here</a>. </em></p>
<p>&nbsp;</p>
<p>Photo by <a href="https://unsplash.com/photos/Pfa7Soh0euw?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">NeONBRAND</a> on <a href="https://unsplash.com/search/photos/reporter?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText">Unsplash</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/vircom-launches-spamreporter-moduscloud/">Vircom launches SpamReporter for modusCloud!</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/vircom-launches-spamreporter-moduscloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SMB Compliance: What every MSP and IT Manager Should be Aware of</title>
		<link>https://www.vircom.com/blog/smb-compliance-data-protection/</link>
					<comments>https://www.vircom.com/blog/smb-compliance-data-protection/#respond</comments>
		
		<dc:creator><![CDATA[Rob Ravensbergen]]></dc:creator>
		<pubDate>Wed, 09 Jan 2019 19:47:13 +0000</pubDate>
				<category><![CDATA[Attachment Defense]]></category>
		<category><![CDATA[modusCloud]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18816</guid>

					<description><![CDATA[<p>Compliance can be a scary word, especially when you aren’t prepared for the requirements you face or are caught by surprise as policies change and become worried about addressing them in a short time frame. In the case of small businesses, this can be even more challenging as you may not have the resources or<br /><a href="https://www.vircom.com/blog/smb-compliance-data-protection/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/smb-compliance-data-protection/">SMB Compliance: What every MSP and IT Manager Should be Aware of</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Compliance can be a scary word, especially when you aren’t prepared for the requirements you face or are caught by surprise as policies change and become worried about addressing them in a short time frame.</p>
<p>In the case of small businesses, this can be even more challenging as you may not have the resources or the fast access to a lawyer that can adequately frame the compliance issues you face as an SMB. Specific to policies like HIPAA, FINRA and PCI, you need to understand your particular regulatory requirements, and how quickly you can address them with the IT tools you use.</p>
<p><em>Disclaimer: this article in no way qualifies as legal advice, and we are not qualified to speak to the legal compliance challenges faced by each and every reader of this article. Be sure to discuss compliance issues with an appropriate attorney and act based on what they offer.</em></p>
<p>Without serving as a definitive guide, this article is meant to serve as a guide to core issues that confront SMBs in their efforts to achieve and maintain regulatory compliance. Here they are:</p>
<p>&nbsp;</p>
<p><strong>Advanced Device and Data Malware Protection</strong></p>
<p>Both PCI and HIPAA cite the need for protecting devices and important data from being exposed to malware and other malicious attacks designed to exfiltrate data from your organization. Everyday anti-virus doesn’t make the cut in this respect, particularly in the case of targeted attacks. Vircom’s <a href="https://www.vircom.com/moduscloud-cloud-email-security/">modusCloud</a> offers advanced <a href="https://www.vircom.com/advanced-malware-protection/">malware detection</a> and real-time dynamic analysis features, along with active sandboxing for both URLs and attachments, that stop email malware and phishing attacks from harming an organization before they even reach inboxes.</p>
<p>&nbsp;</p>
<p><strong>Identifying and Protecting Sensitive Data in Email Communications</strong></p>
<p>modusCloud allows organizations to use smart identifiers and managed dictionaries which enable quick and easy construction of policies that protect organizations from data breach, pre-configured based on the industry standards that exist for regulatory compliance, whether it’s in healthcare, financial services, real estate, retail or others. Data Loss Prevention policies can also be introduced with modusCloud, automatically scanning outbound emails for sensitive terms and stopping them from leaving the organization, eliminating the risk of data breach via email.</p>
<p>&nbsp;</p>
<p><strong>Secure Transmission of Protected Data via Email</strong></p>
<p>HIPAA and other policies mandate the secure transmission of protected data, whether it’s Personal Health Information, credit card and social security numbers or identifiable, regulated terms. modusCloud allows organizations to create policies that trigger encryption of sensitive messages, rather than blocking their sending, depending on the specific processes they want to create.</p>
<p><a href="https://www.vircom.com/secure-email-encryption/">modusCloud’s encryption</a> employs SMTP over enforced TLS in transmission, while data is stored to ISO 27002 data protection standards at rest – all accessed through a secure portal. modusCloud also allows users to trigger encryption themselves with a subject line tag or Outlook plugin. All of these features allow your organization to maximize both the security and usability of email for regulatory compliance and eliminate the concerns that emerge from day-to-day transactions involving protected data and regulatory compliance.</p>
<p>&nbsp;</p>
<p><strong>Email Continuity and Policy Violation Visibility</strong></p>
<p>HIPAA regulations require the ability to continue critical business processes in an emergency, including the ability to protect PHI. In the event of a network outage, whether on-premise or through cloud services like Office 365, <a href="https://www.vircom.com/business-email-continuity-solutions/">modusCloud’s Emergency Inbox</a> allows email communications to continue flowing, permitting both normal operations and enforcement of security and filtering policies to continue without interruption. Aside from protecting your organization in the case of broad emergencies, modusCloud also allows for alerts to potential policy violations, along with detailed logging which permits owners or management to track end-users and educate them, whether they inadvertently or intentionally violate policies.</p>
<p>&nbsp;</p>
<p><strong>Record Retention and Email Production through Email Archiving</strong></p>
<p>Various regulatory regimes in financial services and other sectors require the maintenance of contract and transaction records for 7 to 10 years or even in perpetuity. With <a href="https://www.vircom.com/email-archiving-solutions/">modusCloud’s Email Archiving</a>, organizations are able to utilize a tamper-proof offsite email archive with 10-year unlimited storage and customizable record retention policies, permitting specific compliance to record retention requirements without hassle or worry.</p>
<p>modusCloud’s Email Archiving also includes fast search and eDiscovery features (particularly when compared to that available with Office 365) which allows for quick and accurate production of email records for either legal suites and proceedings or when trying to maintain transparency and good faith in the face of regulatory scrutiny &#8211; a critical feature in resolving such regulatory issues as they emerge.</p>
<p>&nbsp;</p>
<p><strong>Compliance with GDPR and Data Protection Policies to come</strong></p>
<p>While the GDPR “apocalypse” has come and gone, few SMBs have yet to be directly affected, but the rapid advance of legally enforced data protection policies around the world have made life a little more uncertain for “the little guy”. With the introduction of GDPR, modusCloud introduced updated libraries that permitted for the protection and secure transmission of specifically enumerated new classes of protected data. As regional and less comprehensive policies will emerge, modusCloud will continue to stay ahead of the trend. Introducing up-to-date data protection doesn’t have to be a challenge when you have the right solutions at hand!</p>
<p>&nbsp;</p>
<p><em>With all the above discussed, there are still more issues around SMB compliance which should compel you to consult with an attorney. In the meantime, consider giving modusCloud a try with a </em><em><a href="https://www.vircom.com/free-trial/">free trial</a></em><em> and seeing how well the solution can help you address the issues you face. </em></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/smb-compliance-data-protection/">SMB Compliance: What every MSP and IT Manager Should be Aware of</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/smb-compliance-data-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Downtime and Cyber Resilience for Office 365</title>
		<link>https://www.vircom.com/blog/cyber-resilience-office-365-downtime/</link>
					<comments>https://www.vircom.com/blog/cyber-resilience-office-365-downtime/#respond</comments>
		
		<dc:creator><![CDATA[Rob Ravensbergen]]></dc:creator>
		<pubDate>Tue, 18 Dec 2018 19:05:40 +0000</pubDate>
				<category><![CDATA[Office 365 Email Security]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18810</guid>

					<description><![CDATA[<p>Office 365 is often presumed to be sufficiently resilient since it is based in the cloud, however the cloud isn’t just an ephemeral architecture. It is in aggregate still subject to many of the same vagaries and challenges that affect individual on-premise deployments. It is only structured in such a way that it is less<br /><a href="https://www.vircom.com/blog/cyber-resilience-office-365-downtime/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/cyber-resilience-office-365-downtime/">Downtime and Cyber Resilience for Office 365</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Office 365 is often presumed to be sufficiently resilient since it is based in the cloud, however the cloud isn’t just an ephemeral architecture. It is in aggregate still subject to many of the same vagaries and challenges that affect individual on-premise deployments. It is only structured in such a way that it is less likely to have a dramatic effect on any one particular business.</p>
<p>Much as this is the case, outages still occur. In the case of Office 365, <a href="https://www.crn.com/news/cloud/microsoft-discloses-outage-for-some-azure-office-365-users">Office 365’s multi-factor authentication locked out users for 8 hours</a> recently with no workaround. We’ve already discussed the challenge posed by <a href="https://www.vircom.com/blog/office-365-email-outages-backup-plan/">Office 365 Email Outages</a>, but with problems of O365 access clearly growing and not shrinking, you need to consider how to adopt a strategy of Cyber Resilience for Office 365.</p>
<p>&nbsp;</p>
<p><strong>What is Cyber Resilience?</strong></p>
<p>According to <a href="https://www.itgovernance.co.uk/cyber-resilience">IT Governance UK</a>, “Cyber Resilience is a broader approach that encompasses cyber security and business continuity management, and aims to defend against potential cyber attacks and ensure your organisation’s survival following an attack.”</p>
<p>To illustrate this difference, ask yourself: what is your usual conception of “security”? To most people this means confidence or comfort that you will be free from harm or interference, most often by a malicious actor, but also from unforeseen disasters, hardships and even accidents.</p>
<p>Resilience builds on this by considering the likelihood of unexpected events interrupting the normal course of business for your organization. The unexpected can always happen, both for well and for ill, so building a durable framework to <a href="https://www.weforum.org/agenda/2016/07/cyber-resilience-what-to-know/">maintain continuity no matter the nature of a risk</a> can prevent your organization from falling victim to challenges where other organizations might find themselves unprepared.</p>
<p>&nbsp;</p>
<p><strong>Representing Resilience Mathematically</strong></p>
<p>It may be hard to adopt the assumption that your service is imperfect, but also that another necessarily imperfect service to back it up might offer you significantly more resilience overall, however within the margins of standard SLA’s today, assessing the total impact and visibility of IT’s continuity efforts can actually be fairly substantial.</p>
<p>Think of it this way: if you have a primary service up 99.99% of the time, it will fail .01% of the time on average. If a parallel service backs this up, and that service is up a different 99.99% of the time, then the two services only have a .0001% probability of being out at the same time.</p>
<p>If you were to go from 1% to .01% downtime, that would be the equivalent of going from experiencing 3.65 days of outages per year to approximately 53 minutes of outages per year. .01% being 53 minutes, depending on the size of your organization and the intensity of your work, this could still have a major impact on you &#8211; especially if you consider that when you do fall victim to an outage, you&#8217;re most likely to take a far greater proportion of downtime than a simple 53 minutes. Aside from all the other benefits of a secondary solution, if you achieve .0001% aggregate downtime (in the case of this example), you’d only experience 31.54 SECONDS of downtime per year.</p>
<p>&nbsp;</p>
<p>SLAs and the expectations software services vary, and obviously committed or financially-backed SLAs exist beyond the pale of 99.99% and above. However, downtime is known to occur, particular with critical systems like Office 365 (as cited in the examples above). Cyber Resilience for Office 365 creates an expectation that you won’t be left vulnerable to a single point of failure within the solutions your organization relies upon.</p>
<p>Cyber Resilience, and Cyber Resilience for Office 365, aren’t exclusively about building up one solution that will always be successful, but building in intelligent redundancies that optimize your outcomes for a variety of different scenarios. Natural disasters, broader architecture failures or other systemic risks all confront organizations of all sizes, and splitting your bets between maximally reliable solutions is the only way to be truly resilient against these sorts of risks.</p>
<p>&nbsp;</p>
<p><em>Deploying an <a href="https://www.vircom.com/office-365-email-security/">email security solution for Office 365</a> is critical to ensuing you get maximum value from this solution, but <a href="https://www.vircom.com/business-email-continuity-solutions/">email continuity for Office 365</a> is also critical to getting around the issues of downtime and lockouts from overzealous features like O365’s MFA. If you’re looking for a solution like this, consider trying a <a href="https://www.vircom.com/free-trial/">free trial</a> of Vircom’s modusCloud solution to get your search started. </em></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/cyber-resilience-office-365-downtime/">Downtime and Cyber Resilience for Office 365</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/cyber-resilience-office-365-downtime/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why “Selective Protection” for Your VIPs is a Bad Move</title>
		<link>https://www.vircom.com/blog/selective-protection-vip-users-bad/</link>
					<comments>https://www.vircom.com/blog/selective-protection-vip-users-bad/#respond</comments>
		
		<dc:creator><![CDATA[Rob Ravensbergen]]></dc:creator>
		<pubDate>Tue, 11 Dec 2018 14:25:12 +0000</pubDate>
				<category><![CDATA[General Cybersecurity]]></category>
		<category><![CDATA[Office 365 Email Security]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18806</guid>

					<description><![CDATA[<p>Often it can be tempting to try to shave costs or expenses by going for the best value within a solution. In many cases, dropping features or add-ins with particular products can save money with little downside, but in the case of security, many IT admins and MSPs try to apply this methodology by implementing<br /><a href="https://www.vircom.com/blog/selective-protection-vip-users-bad/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/selective-protection-vip-users-bad/">Why “Selective Protection” for Your VIPs is a Bad Move</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Often it can be tempting to try to shave costs or expenses by going for the best value within a solution. In many cases, dropping features or add-ins with particular products can save money with little downside, but in the case of security, many IT admins and MSPs try to apply this methodology by implementing selective protection only their highest-value users with high-end security tools.</p>
<p>In the end, this choice – while potentially due to an attentional bias that is always devoted to top decision-makers within an organization – can ultimately end up costing you more and making you less likely to achieve your desired result of <em>effectively</em> protecting these users.</p>
<p>&nbsp;</p>
<p>Specific to this, there are many companies we (and we’re sure others) interact with who seek to deploy Advanced Threat Protection or other features exclusively to their executive teams or another limited set of users. This is under the assumption that threats and solicitations only affect such users – not even the assumption that they might only <em>disproportionately</em> affect such users – and that not a dollar more need to be wasted in protecting users outside of core executives or particular departments.</p>
<p>While it’s understandable that these high-value targets are more likely to be targeted, selective protection doesn’t actually make them safer, and may make you more vulnerable with the <em>assumption</em> that they are safe and protected, leaving you less vigilant to threats as they do emerge. This means that <em>selective protection is a</em> <em>universally bad choice for any organization, particularly in the case of email.</em></p>
<p>This isn’t the only reason selective protection is bad, as there are many specific reasons for this, including:</p>
<p>&nbsp;</p>
<p><strong>Your “Low-Authority” Users are the easiest Path to Your High-Authority Ones</strong></p>
<p><a href="https://www.proofpoint.com/us/corporate-blog/post/three-key-trends-our-latest-cybersecurity-research">A full 67% of targeted malware and phishing attacks are accounted for by first-line managers and individual contributors</a> – not members of your C Suite. Cyber Criminals are crafty, and when they don’t hunt, they gather. This is an easy aphorism, but it has very real impacts on your organization. For instance, consider the case of <a href="https://www.helpnetsecurity.com/2018/05/18/office-365-phishing-threats/">Office 365 phishing</a> – many organizations jump on the platform expecting to have total ease of use and security, but are surprised by the prevalence of security threats within its infrastructure.</p>
<p>Now, why should this worry you if you only want to protect high-authority users? Well, consider the possibility that one of your low-authority users gets compromised. After hunting out this account, a cyber criminal may seek to compromise any data or information held therein, and then upon having rooted out any such information, use the compromised account to then compromise other high-authority accounts <em>within</em> your organization.</p>
<p>In this case, you’ve paid for additional protection for your high-authority user, but have provided no additional assistance in protecting them – only a minor roadblock to a cyber criminal’s intent to compromise accounts and subsequently breach data, bark out orders, send out false orders or payment requests and more.</p>
<p>&nbsp;</p>
<p><strong>“Limited Aims” Protection Leaves Significant Gaps</strong></p>
<p>Finding a heuristic or decision-making mechanism can be a difficult task for protection. Again, in the case of email, consider this: Is everybody on the executive team a high-authority user? Is everybody with authorization to pay or fulfill an invoice to the company? Anybody who participates in an interaction with a partner or significant client? Anybody who works as a contractor but has access to protected information, or information from which protected information can be inferred? Are any of your employee’s devices networked to the devices or others within the company?</p>
<p>All of the above are risks, and in most companies, at least one of these criteria will affect most of your users. Beyond that, of the employees excluded, what are the costs to the company when employees fall victim to malware on a personal device, or a gift-card related phishing scam? At this point, you’re not really saving anybody time or money – and you may simply be creating individual costs for members of your organization who are still needed to contribute.</p>
<p>&nbsp;</p>
<p><strong>You Are Underestimating the Value of Protecting all Users</strong></p>
<p>Ultimately, any breach has costs that we can’t evaluate beforehand. <a href="https://www.csoonline.com/article/3110756/data-breach/a-deeper-look-at-business-impact-of-a-cyberattack.html?nsdr=true">Deloitte estimates that 90% of a cyber attack’s costs are unaccounted for by most businesses</a> in their security analysis, and the sources of these costs can add up in the years (not months or days) after an attack. These could include:</p>
<ul>
<li>Customer Data Breach Notifications</li>
<li>Post-Breach additions to Protection</li>
<li>Regulatory compliance – either through fines or time-consuming oversight</li>
<li>Crisis communications and recovery costs</li>
<li>Attorneys’ fees and litigation</li>
<li>Additional cybersecurity improvements or restructuring to compensate for the costs of a successful attack</li>
<li>Technical investigations and new reporting mechanisms</li>
<li>Insurance premium increases</li>
<li>Increased costs to raise debt</li>
<li>Operational disruption</li>
<li>Burning of customer relationships</li>
<li>Lost contract revenue</li>
<li>Diminishment or overall brand value or reputation</li>
<li>Loss of propriety information or intellectual property</li>
</ul>
<p>With all these possibilities difficult to quantify, why would you ever leave an open door anywhere that you don’t absolutely need to?</p>
<p>&nbsp;</p>
<p><strong>Conclusion</strong></p>
<p>With the aforementioned reasons in mind, when deciding how to best protect your organization, please don’t consider selective protection for your highest-authority users (or at least the ones who are most likely to complain about a spam or phishing email). If you’re doing it to cut cost, you may learn in this case that it can be “awful expensive to be cheap”.</p>
<p>&nbsp;</p>
<p><em>modusCloud is a powerful <a href="https://www.vircom.com/moduscloud-cloud-email-security/">cloud email security solution</a> built to protect your organization at the gateway. With phishing protection, URL and attachment defense and more features that stop Advanced Threats, modusCloud can ensure you’ll usually be safe, and rarely be sorry!</em></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/selective-protection-vip-users-bad/">Why “Selective Protection” for Your VIPs is a Bad Move</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/selective-protection-vip-users-bad/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Office 365 Advanced Threat Protection: Upside and Pitfalls</title>
		<link>https://www.vircom.com/blog/office-365-advanced-threat-protection/</link>
					<comments>https://www.vircom.com/blog/office-365-advanced-threat-protection/#respond</comments>
		
		<dc:creator><![CDATA[Rob Ravensbergen]]></dc:creator>
		<pubDate>Wed, 05 Dec 2018 19:21:02 +0000</pubDate>
				<category><![CDATA[Attachment Defense]]></category>
		<category><![CDATA[modusCloud]]></category>
		<category><![CDATA[Office 365 Email Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[URL Defense]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18798</guid>

					<description><![CDATA[<p>Office 365 Advanced Threat Protection (ATP) is a much-ballyhooed solution built to protect organizations from malicious attacks via multiple functionalities, including: Scanning email attachments for malware Scanning URLs in email messages and Office documents Identifying and blocking malicious files in SharePoint, OneDrive and Microsoft Teams Checking email messages for unauthorized spoofing Detecting when someone attempts<br /><a href="https://www.vircom.com/blog/office-365-advanced-threat-protection/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/office-365-advanced-threat-protection/">Office 365 Advanced Threat Protection: Upside and Pitfalls</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Office 365 Advanced Threat Protection (ATP) is a much-ballyhooed solution built to protect organizations from malicious attacks via multiple functionalities, including:</p>
<ul>
<li>Scanning email attachments for malware</li>
<li>Scanning URLs in email messages and Office documents</li>
<li>Identifying and blocking malicious files in SharePoint, OneDrive and Microsoft Teams</li>
<li>Checking email messages for unauthorized spoofing</li>
<li>Detecting when someone attempts to impersonate your users and your organization’s custom domains through built-in anti-phishing capabilities</li>
</ul>
<p>&nbsp;</p>
<p>The product has strengths in its ability to set granular policies for its anti-phishing, safe links and safe attachments functions, as well as reporting to Microsoft which has a broad swath of deployments and visibility to a variety of threats (despite the prevalence of 3<sup>rd</sup> party filtering and security solutions for Office 365, which makes this somewhat less of a value-add).</p>
<p>Microsoft defines its ATP solution as a significant step up from its Exchange Online Protection service for email filtering, however we and many others can tell you that <a href="https://www.vircom.com/blog/office-365-spam-filter-eop-not-enough/">Exchange Online Protection as a spam filter</a> is full of problems of its own. There are additional perceived limitations for many customers and service providers as to the availability Office 365 Advanced Threat Protection across Exchange Online, Business, Enterprise and A plans. Click tracking and the bundled nature of Microsoft’s packages make these options generally attractive for the average SME, but the overall limitations of the service are starkly apparent when considering the variety of issues present within ATP and with the services that often are (or aren’t) bundled along with it.</p>
<p>&nbsp;</p>
<p><strong>Limited protection from Intra-O365 Phishing</strong></p>
<p>On top of EOP’s inherent limitations and underdeveloped technology, Office 365 suffers from certain infrastructural oddities that seem to effectively whitelist phishing messages sent between Office 365 tenants. <a href="https://www.helpnetsecurity.com/2018/05/18/office-365-phishing-threats/">Office 365 phishing</a> is a significant risk because even as an organization may be protected from the outside, there are over 120 million commercial customers and 1 billion users on Office 365, significantly expanding the apparently “protected” pool from which malicious emails can be sent. This can lead to frequent and perpetual account compromises, a snowball effect which not only puts data and transactions at risk, but also adds up to thousands of dollars in wasted IT time and other costs per year.</p>
<p>&nbsp;</p>
<p><strong>No contingency for Email Outages</strong></p>
<p>This is not necessarily a flaw of ATP in itself, as Office 365 Advanced Threat Protection is not meant to include this as a feature, but when considering the possibility of an <a href="https://www.vircom.com/blog/office-365-email-outages-backup-plan/">Office 365 email outage</a> as both very real and quite frequent, 3<sup>rd</sup> party security providers have anticipated such needs and deploy solutions that permit you to spool email and gain access to an emergency inbox so that productivity is maintained despite situations where email may be unavailable. Vircom’s <a href="https://www.vircom.com/business-email-continuity-solutions/">modusCloud Email Continuity service</a> is one such solution.</p>
<p>&nbsp;</p>
<p><strong>No usability concerns for Archiving</strong></p>
<p>Again, not a flaw of ATP, but important to consider as bundling your solution with Microsoft is usually motivated by a desire to <em>save</em> money, you may get more overall value from a third-party solution. Native <a href="https://www.vircom.com/blog/office-365-email-archiving-the-good-bad-and-ugly/">Office 365 Email Archiving</a> presents some benefits, but generally lacks speed and legal defensibility that’s required by compliance-driven organizations, ultimately limiting its ability to achieve the primary purpose for which most buy email archiving – namely: regulatory compliance.</p>
<p>&nbsp;</p>
<p><strong>Overall hidden costs that add up vs 3<sup>rd</sup> Party Services</strong></p>
<p>Large-scale software implementations can often bear hidden costs, but those particular to Office 365 can be truly difficult to swallow. Not only are there inherent limitations to Office 365 Advanced Threat Protection, but your time spent addressing them can only add to <a href="https://redmondmag.com/pages/native/vircom-2-2018.aspx">Office 365’s hidden costs</a>.</p>
<p>Vircom offers <a href="https://www.vircom.com/office-365-email-security/">Office 365 email security</a> that gives your organization both more usability and more protection from malicious attacks and regulatory risks. modusCloud’s <a href="https://www.vircom.com/moduscloud-cloud-email-security/">cloud email security</a> can provide for all needs that O365’s might not, while additionally providing email continuity, email encryption and email archiving that adds true value to organization’s seeking to maximize their safety and productivity.</p>
<p>&nbsp;</p>
<p><em>Office 365 offers a powerful suite of services for Managed Services Providers as well as end-customer organizations, and protecting O365 email while managing billing and mailbox counts is now easier than ever through Vircom’s new <a href="https://www.vircom.com/email-security-connectwise-manage/">email security integration for ConnectWise Manage</a>. Learn more by <a href="https://www.vircom.com/become-a-vircom-partner/">becoming a partner today</a>!</em></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/office-365-advanced-threat-protection/">Office 365 Advanced Threat Protection: Upside and Pitfalls</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/office-365-advanced-threat-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Forcepoint/Websense Partner Cull: What You Need to Know</title>
		<link>https://www.vircom.com/blog/forcepoint-websense-partner-cull-what-you-need-to-know/</link>
					<comments>https://www.vircom.com/blog/forcepoint-websense-partner-cull-what-you-need-to-know/#respond</comments>
		
		<dc:creator><![CDATA[Rob Ravensbergen]]></dc:creator>
		<pubDate>Tue, 27 Nov 2018 17:34:40 +0000</pubDate>
				<category><![CDATA[General Cybersecurity]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">https://www.vircom.com/?p=18794</guid>

					<description><![CDATA[<p>Forcepoint recently announced that it would be culling its partner base in order to better focus its efforts on the Enterprise space. “We’re not focusing our future on the small business,” says Forcepoint CEO Matt Moynahan. “We want to double our investment in half the partner community and really drive strategic partnerships.” If you’re reading<br /><a href="https://www.vircom.com/blog/forcepoint-websense-partner-cull-what-you-need-to-know/" class="more">Read more</a></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/forcepoint-websense-partner-cull-what-you-need-to-know/">Forcepoint/Websense Partner Cull: What You Need to Know</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Forcepoint recently announced that it would be culling its partner base in order to better focus its efforts on the Enterprise space. “We’re not focusing our future on the small business,” says Forcepoint CEO Matt Moynahan. <a href="https://www.crn.com/news/security/forcepoint-to-cull-partner-base-as-firm-deepens-focus-on-enterprise?itc=refresh">“We want to double our investment in half the partner community and really drive strategic partnerships.”</a></p>
<p>If you’re reading this and among the 10 to 15 thousand SMB-focused channel partners that were once part of Websense’s channel strategy, you may already realize that since its private-equity/defense contractor co-acquisition and rebranding into Forcepoint, the company’s priorities have gradually shifted, and now that transition is reaching high gear.</p>
<p>Ex-Goldman Sachs Analyst, Harvard Business School MBA graduate and current CEO of Forcepoint Moynahan already states that Forcepoint would like to have a majority of its business flowing through less than 1000 channel partners, and that will come at the cost of severing ties with so many of the partners who helped Websense become the company it was before its acquisition and rebranding.</p>
<p>&nbsp;</p>
<p>Forcepoint’s focus in this is to better support large government agencies and mid-market and enterprise commercial customers, providing more resources to fewer partners who are explicitly committed to selling multiple Forcepoint products and generate an impression of leadership in the channel, all done at Forcepoint’s bidding of course.</p>
<p>This radical shift will affect far more partners than may be initially conceived, as efforts to recruit any business <em>with less than 500 users </em>will be de-emphasized by Forcepoint. “We’re paying a lot of money to partners who were supporting an SMB company a decade ago,” Moynahan said. “We need to reset that relationship.” Moynahan states this while also “reassuring” partners with nebulous comments like “This is an evolution, not a revolution. If partners are committed, we’ll be committed to them.”</p>
<p>Forcepoint partners <em>not serving</em> target customers of 500+ or 2000+ users each may as well read this as “You don’t make us enough money. Give us more or see ya later!”</p>
<p>&nbsp;</p>
<p>A little history here: Vista Equity Partners and Raytheon teamed up to <a href="https://www.zdnet.com/article/raytheon-websense-rebrands-as-forecepoint-acquires-intel-securitys-stonesoft/">acquire Websense for $1.9 Billion in 2015</a>. Vista Equity, the private equity firm that most famously <a href="https://www.cnbc.com/2018/09/20/adobe-confirms-its-buying-marketo-for-4point75-billion.html">flipped Marketo for nearly $3 billion in profit</a>, presumably brings the management chops to this deal, while Raytheon, the $50 billion defense contractor most famous for missile defense systems, most likely brings general “security” credentials to this deal and greater access to public agencies and large government organizations.</p>
<p>Ultimately, the tactic that works best for these kinds of buyouts is to either flip the business or maximize profits, which are then returned to partners or used to buyout and flip more companies. The best way to do this with individual firms is to make more money while also passing on costs to employees, customers and partners, and have those same constituencies feel blessed simply to be in league with the likes of Forcepoint.</p>
<p>&nbsp;</p>
<p>Disregarding the fact that there are still plenty of SMBs and partners who serve them that work with government and fundamentally support the activities of larger firms, one would expect this forced exodus to deliver great results for Forcepoint’s books in the short term while reducing the reliability and growth potential of their business in the long run. As for the individual channel partners and SMBs who have paid Forcepoint their due for so many years, one would expect that they will move on looking not to get burned again.</p>
<p><em>If you’re an SMB-focused channel partner who joined Websense years ago when the true focus was email security, only to find your commitment questioned today, consider <a href="https://www.vircom.com/moduscloud-cloud-email-security/">modusCloud email security</a>, our solution for filtering, advanced threat protection, encryption, archiving and compliance that enables you to better serve customers of any size. If you want to kick the tires, <a href="https://www.vircom.com/free-trial/">provision your account and get access to a free trial here</a>.</em></p>
<p>The post <a rel="nofollow" href="https://www.vircom.com/blog/forcepoint-websense-partner-cull-what-you-need-to-know/">Forcepoint/Websense Partner Cull: What You Need to Know</a> appeared first on <a rel="nofollow" href="https://www.vircom.com">Vircom | Email Security Experts</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vircom.com/blog/forcepoint-websense-partner-cull-what-you-need-to-know/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
