Blog

Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.

Invalid Input
Image
How Rogue Domain Registrars enable Cybercrime

Domain registrars that allow domains to be registered without any kind of identification required make it very easy for cybercriminals to commit crimes in complete anonymity. Unfortunately, there are many of these rogue registrars around and they are endangering businesses and people by not implementing industry standards and best practices.

Navigating NIS2 and Article 28: The Importance of KYC for Domain Name Registrants

The NIS2 Directive places new requirements on domain name registrars to get accurate information on registrants in order to minimise the anonymity that enables cybercrime.

What is BIMI and why it's important for your brand

BIMI (Brand Indicators for Message Identification) is a way to quickly show email recipients that emails actually originate from your organization. It allows you to add your brand logo to all outgoing emails so recipients can trust that they come from you and not a malicious third party. 

Making the Internet a Safer Place for Businesses and People

Excedo's mission has always been to protect businesses and people online. This requires a holistic approach covering everything from email security and domain management to threat intelligence.

Email Security and NIS2: Why the Public Sector needs DMARC for NIS2 Compliance

The requirements of the NIS2 Directive are extensive and address many different aspects of digital security, including email security. For organizations to meet the email security standards set by NIS2, they need a correctly configured DMARC policy.

Why Anycast DNS should be part of your NIS2 implementation plan

Anycast DNS provides the online resilience required by the NIS2 Directive. It ensures online resources and services are always available even when attacks do happen by providing multiple routing options that make it possible to filter out malicious traffic.

Why implementing DMARC for all your domains matters

Implementing a DMARC policy for very small organizations is not too complex. Generally, one just needs to ensure it is implemented correctly for a single domain. However, for larger organizations, with multiple domains and email systems, it is much more complicated.

What you need to know about the NIS2 Directive in Sweden

The NIS2 Directive will raise digital security levels across the EU. Although its jurisdiction spans across borders, individual countries have a say in how the requirements will be implemented locally and if they want to go above and beyond the security baseline set by NIS2.

What is a DDoS Attack?

DDoS (Distributed Denial of Service) attacks threaten the availability of essential services and systems worldwide. The first step to protection is to understand what these attacks look like and what vulnerabilities they exploit.

What is cybersquatting and how to protect yourself from it

There are many reasons to secure and closely control your digital IP. An important reason is to protect your organization from online brand abuse, where malicious third parties use your brand name to commit fraud.

Making the Internet Safer: Google and Yahoo enhance Email Security

The default settings of most major email providers have for a long time not been enough to stop email threats from reaching inboxes. But that is now changing with Google and Yahoo's new email security requirements, including the mandatory implementation of DMARC.

What is DMARC and why you need it to keep your emails safe

A DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy is a key part of organizational email security. It prevents email threats from reaching your employees and users, and it is now a requirement by major email providers like Gmail and Yahoo.

Page 2 of 2

Keep up with the latest news and articles from Excedo
on LinkedIn
Contact us
+46-8-50161200
First name is required
Email is required
Company name is required
Last name is required
Invalid Input
Invalid Input
You have to select an option
Please write your message.
*
You have to agree
Company name is required
First name is required
Email is required
Last name is required
Invalid Input
This is a required field
Please write your message.
*
You have to agree