PR – Research by Ingressum Indicates Poor State of Cyber Readiness of Philippine Banking sector

Manila, Philippines, March 6, 2019 Press Release: Key research undertaken by Ingressum Philippines Corp, indicates 95% of the Philippine banking and finance sector is NOT prepared for any cyber threats as a result of digital transformation most banks are undertaking now or due to undertake in the short term. Ingressum Philippines Corp will be sharing …

PR – Research by Ingressum Indicates Poor State of Cyber Readiness of Philippine Banking sector Read More »

O365 – Easy guide to add DMARC

Microsoft’s O365 platform supports the email authentication protocol called DMARC (Domain-based Message Authentication, Reporting, and Conformance). This protocol prevents spammers from illegitimately using your email domain and sending email with a “From” address that makes email appear to come from someone in your domain. The impact of spammers illegitimately using your domain to send spam …

O365 – Easy guide to add DMARC Read More »

GSuite – Easy guide to add DMARC

Gmail supports the email authentication protocol called DMARC (Domain-based Message Authentication, Reporting, and Conformance). This protocol prevents spammers from illegitimately using your email domain and sending email with a “From” address that makes email appear to come from someone in your domain. The impact of spammers illegitimately using your domain to send spam or junk …

GSuite – Easy guide to add DMARC Read More »

Gmail for Business and O365 users – DMARC is free !!

Ok I admit it – I am a DMARC advocate, evangelist and all round believer in this standard. Key takeaway – DMARC protocol is FREE and you can implement DMARC whilst you do a review for the best email cloud security/filtering platform – they are independent of each other. Scenario – I’m at dinner with …

Gmail for Business and O365 users – DMARC is free !! Read More »

Mandatory Data Breach Reporting (Australia)

An entity that is required to comply with the Privacy Act 1988 must take reasonable steps to protect the personal information it holds from misuse, interference and loss, as well as unauthorised access, modification or disclosure.  This extends to situations where an entity engages a third party to store, maintain or process personal information on its behalf. …

Mandatory Data Breach Reporting (Australia) Read More »

Sharing information to mitigate a phishing campaign

Sharing information is an important method to raise awareness of any potential issue. With the addition of practical advice, the reader can identify the relevance of that information and its usefulness to mitigate an issue. Reading this article again and again I keep on focussing on aspects that haven’t been addressed – of course there’s …

Sharing information to mitigate a phishing campaign Read More »

In response to “Raising the red flag on recent DMARC hype”

DMARC Compliance is a process that uses a DMARC dashboard as a tool to receive and analyse reports through which informed recommendations can be made. So lets discuss the flaws identified. Mailsploit – this website identifies bugs in certain email applications that are shown to be vulnerable to XSS and code injection attacks. In fact, …

In response to “Raising the red flag on recent DMARC hype” Read More »