Houston  Sipes

Houston Sipes

1596823200

How to Integrate Plesk Premium Email with Plesk Email Security

As the coronavirus pandemic impacts the way we do business, remote work has rapidly increased. And with it, the risks of cyber threats. This fact has ramped up the need for security efforts to help keep data protected. At Plesk Premium Email, powered by Kolab, we are continuously updating our solutions and enhancing its features to help companies and users better protect their systems and improve its functionalities. Let’s find out more about its benefits.

Enhance Protection Against Spam and Viruses

Plesk Premium Email protects you against spam with the SpamAssassin component, an anti-spam tool that helps filter out unwanted messages. It gives your system administrators a filter to classify email and block unsolicited bulk emails. The extension can be highly customized to suit different scenarios and environments. Additionally, Plesk Premium Email protects you against cross-site request forgery attacks by detecting if your current session could have been hijacked by an attacker and asking for your confirmation to proceed.

Plesk’s secure email is now even more secure with the addition of Plesk Email Security extension, which provides further layers of protection with more configuration options and additional virus protection features. It requires no manual configuration or CLI adjustments for open-source tools.

To make use of Plesk Email Security, you need to start by installing the extension which complements the rest of the webmail features. Follow these simple steps to install Plesk Email Security and further enhance the security and spam combating abilities of your Plesk Premium Email installation.

Installing Plesk Email Security

Step 1: Find and install the extension.

Step 1 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Step 2: Navigate to Plesk Email Security in the Settings.

Step 2 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Step 3: Install the necessary packages.

Step 3 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Step 4: Configure email to be moved to the Spam folder to continue receiving the spam in the Spam folder in Plesk Premium Email.

Step 4 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Step 5: Once Plesk Email Security installation is done and dusted, the dashboard should look like this:

Step 5 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Our continued focus on security provides you with the ultimate protection from modern threats through a series of powerful tools that help you protect, detect, and respond against the ever-evolving threats. By taking the above simple steps you can be assured that your security issues are minimized to the best of your ability.

Get Started with Our Special Offers

Plesk Email Security increases protection in your Plesk Premium Email subscription against threats such as phishing and malware and deflects damage to your business. And with our permanent offer, you can get Plesk Email Security for 12 months and pay for 10 months only. Additionally, we’re currently offering 6 months free for Plesk Premium Email during these unprecedented times. You can find all details about this offer here.

#plesk news and announcements #product and technology #email secuirty #kolab #malware #plesk email secuirty #plesk premium email. spamassassin #security #spam

What is GEEK

Buddha Community

How to Integrate Plesk Premium Email with Plesk Email Security
Houston  Sipes

Houston Sipes

1596823200

How to Integrate Plesk Premium Email with Plesk Email Security

As the coronavirus pandemic impacts the way we do business, remote work has rapidly increased. And with it, the risks of cyber threats. This fact has ramped up the need for security efforts to help keep data protected. At Plesk Premium Email, powered by Kolab, we are continuously updating our solutions and enhancing its features to help companies and users better protect their systems and improve its functionalities. Let’s find out more about its benefits.

Enhance Protection Against Spam and Viruses

Plesk Premium Email protects you against spam with the SpamAssassin component, an anti-spam tool that helps filter out unwanted messages. It gives your system administrators a filter to classify email and block unsolicited bulk emails. The extension can be highly customized to suit different scenarios and environments. Additionally, Plesk Premium Email protects you against cross-site request forgery attacks by detecting if your current session could have been hijacked by an attacker and asking for your confirmation to proceed.

Plesk’s secure email is now even more secure with the addition of Plesk Email Security extension, which provides further layers of protection with more configuration options and additional virus protection features. It requires no manual configuration or CLI adjustments for open-source tools.

To make use of Plesk Email Security, you need to start by installing the extension which complements the rest of the webmail features. Follow these simple steps to install Plesk Email Security and further enhance the security and spam combating abilities of your Plesk Premium Email installation.

Installing Plesk Email Security

Step 1: Find and install the extension.

Step 1 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Step 2: Navigate to Plesk Email Security in the Settings.

Step 2 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Step 3: Install the necessary packages.

Step 3 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Step 4: Configure email to be moved to the Spam folder to continue receiving the spam in the Spam folder in Plesk Premium Email.

Step 4 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Step 5: Once Plesk Email Security installation is done and dusted, the dashboard should look like this:

Step 5 Installing Plesk Email Security - How to Integrate Plesk Premium Email with Plesk Email Security - Plesk

Our continued focus on security provides you with the ultimate protection from modern threats through a series of powerful tools that help you protect, detect, and respond against the ever-evolving threats. By taking the above simple steps you can be assured that your security issues are minimized to the best of your ability.

Get Started with Our Special Offers

Plesk Email Security increases protection in your Plesk Premium Email subscription against threats such as phishing and malware and deflects damage to your business. And with our permanent offer, you can get Plesk Email Security for 12 months and pay for 10 months only. Additionally, we’re currently offering 6 months free for Plesk Premium Email during these unprecedented times. You can find all details about this offer here.

#plesk news and announcements #product and technology #email secuirty #kolab #malware #plesk email secuirty #plesk premium email. spamassassin #security #spam

Hollie  Ratke

Hollie Ratke

1597626000

Best Practices for Running Your Own Email Server

Plesk Premium Email, powered by Kolab lets you become your own mail service provider in a few easy steps. It’s like creating a personal Gmail service, one that you control from top to bottom. Running the mail server allows you to store your own email, access the mail server’s logs, and access the raw email files in a user’s mailbox.

However, one key concern when running your own mail server is email deliverability. Without being able to effectively reach your customer base, you cannot do business. So, how do you ensure your emails do not end up as spam?

It’s important to follow common rules and best practices when operating a mail server to guarantee your emails always reach their destination. In this quick guide, we’ll walk you through a few things to consider, to make sure that your emails always end up where you intend.

Reputation Management

Much of email delivery depends on your reputation, which is attached to your IPs and domains.

Please note that there might be different types of setups where you can either influence these things or not:

  • If you’re **running your own server **(or VPS – virtual private server) or a bunch of servers with Plesk for shared hosting with WHMCS, you have full influence and control about the following settings.
  • If you’re an **end customer or reseller **of a service provider or hoster using Plesk, unfortunately only your hosting provider can do these modifications for you. In case you want to regain control of your environments, it’s time to move your shared hosting account to your own VPS!
  • If you run Plesk on one of the hyperscale cloud providers such as DigitalOcean, Linode, AWS/Lightsail, Azure, or Google, your default email / SMTP (Port 25 or not) might be blocked on the infrastructure level. If that’s the case, you might need to contact their support to unblock it. In addition, also check that you’re receiving a reverse DNS entry for your IP that is required for operating an email server properly.

The two key-factors that we can influence are:

**1. Ensure other servers can distinguish **between genuine email coming from your server and spam coming from other servers, pretending to come from your server. If you don’t, a spammer can burn your hard-earned reputation while delivering their spam.

You can ensure this by enabling DKIM/DMARC and SPF protection in Plesk under “Server-Wide Mail Settings”.

#plesk news and announcements #email #email server #kolab #plesk email security #plesk premium email #self-hosted email #spam

Ayan Code

1656193861

Simple Login Page in HTML and CSS | Source Code

Hello guys, Today in this post we’ll learn How to Create a Simple Login Page with a fantastic design. To create it we are going to use pure CSS and HTML. Hope you enjoy this post.

A login page is one of the most important component of a website or app that allows authorized users to access an entire site or a part of a website. You would have already seen them when visiting a website. Let's head to create it.

Whether it’s a signup or login page, it should be catchy, user-friendly and easy to use. These types of Forms lead to increased sales, lead generation, and customer growth.


Demo

Click to watch demo!

Simple Login Page HTML CSS (source code)

<!DOCTYPE html>
  <html lang="en" >
  <head>
    <meta charset="UTF-8">
    <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css">
  <link rel="stylesheet" href="styledfer.css">
  </head>

  <body>
   <div id="login-form-wrap">
    <h2>Login</h2>
    <form id="login-form">
      <p>
      <input type="email" id="email" name="email" placeholder="Email " required><i class="validation"><span></span><span></span></i>
      </p>
      <p>
      <input type="password" id="password" name="password" placeholder="Password" required><i class="validation"><span></span><span></span></i>
      </p>
      <p>
      <input type="submit" id="login" value="Login">
      </p>

      </form>
    <div id="create-account-wrap">
      <p>Don't have an accout? <a href="#">Create One</a><p>
    </div>
   </div>
    
  <script src='https://code.jquery.com/jquery-2.2.4.min.js'></script>
  <script src='https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/jquery.validate.min.js'></script>
  </body>
</html>

CSS CODE

body {
  background-color: #020202;
  font-size: 1.6rem;
  font-family: "Open Sans", sans-serif;
  color: #2b3e51;
}
h2 {
  font-weight: 300;
  text-align: center;
}
p {
  position: relative;
}
a,
a:link,
a:visited,
a:active {
  color: #ff9100;
  -webkit-transition: all 0.2s ease;
  transition: all 0.2s ease;
}
a:focus, a:hover,
a:link:focus,
a:link:hover,
a:visited:focus,
a:visited:hover,
a:active:focus,
a:active:hover {
  color: #ff9f22;
  -webkit-transition: all 0.2s ease;
  transition: all 0.2s ease;
}
#login-form-wrap {
  background-color: #fff;
  width: 16em;
  margin: 30px auto;
  text-align: center;
  padding: 20px 0 0 0;
  border-radius: 4px;
  box-shadow: 0px 30px 50px 0px rgba(0, 0, 0, 0.2);
}
#login-form {
  padding: 0 60px;
}
input {
  display: block;
  box-sizing: border-box;
  width: 100%;
  outline: none;
  height: 60px;
  line-height: 60px;
  border-radius: 4px;
}
#email,
#password {
  width: 100%;
  padding: 0 0 0 10px;
  margin: 0;
  color: #8a8b8e;
  border: 1px solid #c2c0ca;
  font-style: normal;
  font-size: 16px;
  -webkit-appearance: none;
     -moz-appearance: none;
          appearance: none;
  position: relative;
  display: inline-block;
  background: none;
}
#email:focus,
#password:focus {
  border-color: #3ca9e2;
}
#email:focus:invalid,
#password:focus:invalid {
  color: #cc1e2b;
  border-color: #cc1e2b;
}
#email:valid ~ .validation,
#password:valid ~ .validation 
{
  display: block;
  border-color: #0C0;
}
#email:valid ~ .validation span,
#password:valid ~ .validation span{
  background: #0C0;
  position: absolute;
  border-radius: 6px;
}
#email:valid ~ .validation span:first-child,
#password:valid ~ .validation span:first-child{
  top: 30px;
  left: 14px;
  width: 20px;
  height: 3px;
  -webkit-transform: rotate(-45deg);
          transform: rotate(-45deg);
}
#email:valid ~ .validation span:last-child
#password:valid ~ .validation span:last-child
{
  top: 35px;
  left: 8px;
  width: 11px;
  height: 3px;
  -webkit-transform: rotate(45deg);
          transform: rotate(45deg);
}
.validation {
  display: none;
  position: absolute;
  content: " ";
  height: 60px;
  width: 30px;
  right: 15px;
  top: 0px;
}
input[type="submit"] {
  border: none;
  display: block;
  background-color: #ff9100;
  color: #fff;
  font-weight: bold;
  text-transform: uppercase;
  cursor: pointer;
  -webkit-transition: all 0.2s ease;
  transition: all 0.2s ease;
  font-size: 18px;
  position: relative;
  display: inline-block;
  cursor: pointer;
  text-align: center;
}
input[type="submit"]:hover {
  background-color: #ff9b17;
  -webkit-transition: all 0.2s ease;
  transition: all 0.2s ease;
}

#create-account-wrap {
  background-color: #eeedf1;
  color: #8a8b8e;
  font-size: 14px;
  width: 100%;
  padding: 10px 0;
  border-radius: 0 0 4px 4px;
}

Congratulations! You have now successfully created our Simple Login Page in HTML and CSS.

My Website: codewithayan, see this to checkout all of my amazing Tutorials.

Wiley  Mayer

Wiley Mayer

1597309200

The Essential Guide to Email Security: Threats, Costs, and Strategies

We all use email on a regular basis, but we aren’t always cognizant of the email security standards we use. If a hacker gains access to your account, or manages to fool you into downloading an attachment with malware via email, it could have devastating consequences for your business.

That’s why many companies choose to invest actively in their email security. But what exactly does email security entail, and how important is it for an organization?

Types of Email Threats

We have to start by identifying the major types of threats associated with email. These threats include:

  • Account access, personal data, and more. If someone gains access to your email account, how much personal data would they be able to access? If you’re like most people, your email contains messages from your financial institutions, your favorite stores, and your personal contacts. Anyone with access to your account will have access to all these data, which can easily be used against you.
  • Phishing and other schemes. Many cyber criminals attempt to use email to execute social engineering schemes. They send links to web pages mocked up to look like authentic sites, but when you enter your password, you’re basically handing your login credentials over to a hacker. Detecting these threats proactively is vital if you want to avoid them.
  • Malware. Malware is still commonly sent via email, because people are still willing to impulsively click suspicious links and download suspicious attachments—even if they should know better. All it takes is one click, and your computer could be infected with ransomware or other types of malware.
  • Evolving threats. It’s also worth noting that cyber threats are constantly evolving. Cyber criminals are always trying to find new vulnerabilities, and new ways to exploit our hardware and software.

The Costs

Are these threats really that dangerous? Well, let’s consider the costs of a potential attack:

  • Financial. The average cost of a cyber attack is now more than $1 million. Attacks on large businesses tend to be costlier, of course, since they usually involve the theft or destruction of more data, but even attacks on small businesses can be devastating.
  • Logistical. After an attack, it can take weeks, if not months to fully recover. You’ll have to make up for whatever damage was done to your organization, instate new security measures, and deal with investigations and paperwork along the way.
  • Reputation. Even if you put better security standards in place as a reaction to this attack, your reputation may never fully recover. Your customers will know your lax standards led to compromised data, and they may never trust you fully again.

Email Security Strategies

Fortunately, there are many email security strategies you can employ and email security software you can use to reduce the possibility (and potential severity) of an email-related attack.

  • Account security strategies. First, you can work to secure your account. Most accounts are compromised because of simple mistakes on behalf of the user; for example, if you choose a simplistic, easy-to-guess password like “qwerty1234,” you’re practically asking for your account to be hacked. Choose a strong password with a mix of different characters, and make it as long as possible. Then, enable multi-factor authentication so no one can gain access to your email account with just a password. You’ll also need to be mindful of phishing and social engineering attempts; never give your password to anyone. These basic steps have the power to prevent the majority of would-be hacks.
  • Spam and phishing filters. Most modern email services have built-in spam filters that attempt to weed out the majority of phishing attempts and other schemes; for example, Google claims that its Gmail filters catch more than 99.9 percent of spam. However, this isn’t enough to detect all phishing schemes or malicious emails. You’ll need to invest in additional filtering if you want to proactively identify these.
  • Virus scans. It’s also a good idea to invest in a malware scanner; this way you can automatically scan new emails (and especially attachments) that come into your account. If your scanner detects a threat, it can warn you and eliminate the threat before it has the chance to do any real damage.
  • Message encryption. Some organizations and individuals invest in additional message encryption, making it practically impossible for prying eyes to read or obtain the data within individual messages. This is especially important if you’re exchanging sensitive personal information, like social security numbers or bank account information.

Just how important is your email security? That’s difficult to say since every business and individual will bear a different level of risk. However, even a single email vulnerability has the potential to have devastating consequences. And securing your email doesn’t take much time, money, or effort at all. Accordingly, email security should be a top priority for every organization—and every individual.

#email #email-security #security #malware #email-attacks #cyber-security #business #web-security

Wilford  Pagac

Wilford Pagac

1596789120

Best Custom Web & Mobile App Development Company

Everything around us has become smart, like smart infrastructures, smart cities, autonomous vehicles, to name a few. The innovation of smart devices makes it possible to achieve these heights in science and technology. But, data is vulnerable, there is a risk of attack by cybercriminals. To get started, let’s know about IoT devices.

What are IoT devices?

The Internet Of Things(IoT) is a system that interrelates computer devices like sensors, software, and actuators, digital machines, etc. They are linked together with particular objects that work through the internet and transfer data over devices without humans interference.

Famous examples are Amazon Alexa, Apple SIRI, Interconnected baby monitors, video doorbells, and smart thermostats.

How could your IoT devices be vulnerable?

When technologies grow and evolve, risks are also on the high stakes. Ransomware attacks are on the continuous increase; securing data has become the top priority.

When you think your smart home won’t fudge a thing against cybercriminals, you should also know that they are vulnerable. When cybercriminals access our smart voice speakers like Amazon Alexa or Apple Siri, it becomes easy for them to steal your data.

Cybersecurity report 2020 says popular hacking forums expose 770 million email addresses and 21 million unique passwords, 620 million accounts have been compromised from 16 hacked websites.

The attacks are likely to increase every year. To help you secure your data of IoT devices, here are some best tips you can implement.

Tips to secure your IoT devices

1. Change Default Router Name

Your router has the default name of make and model. When we stick with the manufacturer name, attackers can quickly identify our make and model. So give the router name different from your addresses, without giving away personal information.

2. Know your connected network and connected devices

If your devices are connected to the internet, these connections are vulnerable to cyber attacks when your devices don’t have the proper security. Almost every web interface is equipped with multiple devices, so it’s hard to track the device. But, it’s crucial to stay aware of them.

3. Change default usernames and passwords

When we use the default usernames and passwords, it is attackable. Because the cybercriminals possibly know the default passwords come with IoT devices. So use strong passwords to access our IoT devices.

4. Manage strong, Unique passwords for your IoT devices and accounts

Use strong or unique passwords that are easily assumed, such as ‘123456’ or ‘password1234’ to protect your accounts. Give strong and complex passwords formed by combinations of alphabets, numeric, and not easily bypassed symbols.

Also, change passwords for multiple accounts and change them regularly to avoid attacks. We can also set several attempts to wrong passwords to set locking the account to safeguard from the hackers.

5. Do not use Public WI-FI Networks

Are you try to keep an eye on your IoT devices through your mobile devices in different locations. I recommend you not to use the public WI-FI network to access them. Because they are easily accessible through for everyone, you are still in a hurry to access, use VPN that gives them protection against cyber-attacks, giving them privacy and security features, for example, using Express VPN.

6. Establish firewalls to discover the vulnerabilities

There are software and firewalls like intrusion detection system/intrusion prevention system in the market. This will be useful to screen and analyze the wire traffic of a network. You can identify the security weakness by the firewall scanners within the network structure. Use these firewalls to get rid of unwanted security issues and vulnerabilities.

7. Reconfigure your device settings

Every smart device comes with the insecure default settings, and sometimes we are not able to change these default settings configurations. These conditions need to be assessed and need to reconfigure the default settings.

8. Authenticate the IoT applications

Nowadays, every smart app offers authentication to secure the accounts. There are many types of authentication methods like single-factor authentication, two-step authentication, and multi-factor authentication. Use any one of these to send a one time password (OTP) to verify the user who logs in the smart device to keep our accounts from falling into the wrong hands.

9. Update the device software up to date

Every smart device manufacturer releases updates to fix bugs in their software. These security patches help us to improve our protection of the device. Also, update the software on the smartphone, which we are used to monitoring the IoT devices to avoid vulnerabilities.

10. Track the smartphones and keep them safe

When we connect the smart home to the smartphone and control them via smartphone, you need to keep them safe. If you miss the phone almost, every personal information is at risk to the cybercriminals. But sometimes it happens by accident, makes sure that you can clear all the data remotely.

However, securing smart devices is essential in the world of data. There are still cybercriminals bypassing the securities. So make sure to do the safety measures to avoid our accounts falling out into the wrong hands. I hope these steps will help you all to secure your IoT devices.

If you have any, feel free to share them in the comments! I’d love to know them.

Are you looking for more? Subscribe to weekly newsletters that can help your stay updated IoT application developments.

#iot #enterprise iot security #how iot can be used to enhance security #how to improve iot security #how to protect iot devices from hackers #how to secure iot devices #iot security #iot security devices #iot security offerings #iot security technologies iot security plus #iot vulnerable devices #risk based iot security program