<img src="https://ws.zoominfo.com/pixel/PMY3ZvbpZt27ywWwZSBB" width="1" height="1" style="display: none;">

Business Copiers & Printers

EO Johnson offers multifunction copiers and printer solutions that are cost effective and easy to use. Trust in the exceptional service and rapid response time of our knowledgeable local service technicians.

Production Print & Finishing

EO Johnson is your one-stop shop for digital production presses, wide-format printing, and finishing equipment. We provide local service and support and have the most technologically advanced Customer Experience Center in the Midwest.

Locknet Managed IT

Locknet Managed IT is a Managed Security Service Provider (MSSP) that is both FFIEC-examined and SOC 2 Type 2 audited. We support businesses in Wisconsin, Minnesota, Iowa, and Illinois with technology strategies and solutions to improve your security position. 24/7/365 remote and onsite support.



Digital Transformation Solutions

EO Johnson’s digital transformation consultants have solutions for every size and type of business. Reduce paper and secure your files with our bulk document scanning. Then streamline your business with process mapping and secured document management.


Gain insights and expand your knowledge with our collection of tools and resources. Stay informed about the latest in business technology, print services, and process improvement. 

Impersonation Protection with Total Email Security

2 min read

Ben Potaracke

Social engineering threats have been increasing in their complexity and ability to evade traditional defenses. Email continues to be the single most common channel for targeting users into becoming victims of social engineering tactics. Today, a multi-layered email security product is necessary to discover and block the latest and most sophisticated attacks with the highest level of threat detection and accuracy, including business email compromise (BEC) and account takeovers.

What is Business Email Compromise and how does it work?


It’s a cyberattack designed to gain access to critical business information or extract money through email fraud. When there is a BEC attack, a bad actor gains access to an email that belongs to an employee. After the email is compromised, the hacker can monitor all email communications, send emails, and delete emails without the victim’s knowledge. When the bad actor sends an email, it appears as though it’s coming from a trusted source. These emails are typically an attempt to convince victims to reveal critical business information or process a payment request. Companies that use wire transfers, foreign suppliers, and other invoice transactions are frequent targets of BEC attacks.

To combat BEC attacks, EO Johnson's team of cybersecurity experts at Locknet have increased the security features through Total Email Protection. Locknet’s Total Email Protection includes the best defenses from our other security offerings like email security, advanced threat detection, archiving, and backup. Plus, Locknet’s Total Email Protection now includes impersonation protection and incident response.

Locknet’s Total Email Protection for Microsoft 365 includes:


  • Email Security
  • Advanced Threat Detection
  • Archiving
  • Backup
  • Impersonation Protection
  • Incident Response

About impersonation protection and incident response


Impersonation Protection combines artificial intelligence, deep integration with Microsoft 365, and brand protection into a comprehensive cloud-based solution that guards against business email compromise, whaling, impersonation attempts or CEO fraud, account takeover, spear phishing, and other cyber fraud. Locknet’s Total Email Protection can automatically remove malicious emails from user inboxes even after the email is delivered to their inbox. It searches all delivered emails, creates incidents, and deletes emails from inboxes with just a few clicks, allowing our team to remediate threats within minutes, instead of hours or days.

With Locknet’s Total Email Protection, we have immediate insight into users who have interacted with, forwarded, or replied to malicious messages which allows us to contain threats faster.

The benefits of impersonation protection


  • API integration with AI inbox defense
  • Protection for spear-phishing, business email compromises, extortion, other socially engineered attacks
  • Automatic quarantining alerts for user and admin
  • Account takeover protection
  • Notifies external users and deleted compromised email
  • Blocks attacker access
  • Visibility into inbox rule changes and suspicious sign-ins
  • Domain fraud protection
  • Protection for domain-based message authentication, reporting, and conformance (DMARC), domain spoofing, and brand hi-jacking

Protect your organization


As a Managed Security Service Provider (MSSP), the EO Johnson team at Locknet Managed IT can improve your security position through cybersecurity monitoring and impersonation protection, so you don’t become part of the startling business email compromise statistics. Partner with us to outsmart these targeted attacks and identify impersonation attempts before they reach your users. Contact us today.




No Comments Yet

Let us know what you think