Google and Yahoo have both announced that they will require all incoming email to be authenticated with verification and security protocols starting in February 2024. This is a huge endorsement of best practices from two of the largest email service providers, and a critical moment for every organization to set up SPF, DKIM, and DMARC protocols properly and monitor them for compliance.
Notes
Insurers play catch-up on cybersecurity policies
When you next try to renew your cybersecurity insurance, you might find the process for approval and the policies available are quite different from before.
Just Right: How can HVAC give us all our own Goldilocks zone?
Join Berardo Matalucci (Co-founder and CEO at MIMiC) and Noah Landow (Founder and CEO at Macktez) for an informal conversation between a leading technology solutions firm and the founder of an innovative, engineering driven startup reframing heating cooling from a building to a personal scale.
Microsoft finally honors DMARC
Configured properly, and then monitored and adjusted over time, DMARC can reduce cybersecurity risks and increase deliverability for legitimate email. (Configured improperly, however, DMARC instructions could result in all of your outgoing email getting rejected — so you need to know what is going on under the hood.)
Las Vegas ransomware incident highlights need for cybervigilance
A ransomware incident ensnaring two of Las Vegas’s largest casinos made national headlines last month and inspired a lot of questions about ransomware, multi-factor authentication, single-sign on, access management, and vishing. What happened? What went wrong?
The new era of access management
An identity and access management (IAM) solution is the padlock or firewall for the work-from-anywhere era. Before you give users access to any business resources, assets, or information, you should implement IAM as a critical component of your organization’s security program.
Recognizing and avoiding phishing scams
Phishing emails and text messages attempt to trick you into clicking on a link, opening an attachment, or sending proprietary information. Often the return address is the name of a person or company you recognize, leading you to believe the message is legitimate. But there are many ways for you to recognize phishing and to avoid falling for scams.
Business phone services now require registration for text messaging
If you are using a mobile app for your business phone service (like RingCentral, Zoom, or Dialpad), you might be used to using SMS text messaging to connect with your contacts. But now, due to new regulations, SMS through business phone services will be restricted until your organization is approved to send business-related SMS.