Access "Six commonly overlooked Exchange security vulnerabilities"
This article is part of the November 2011, Vol. 11 issue of Help with Office 365, mobile devices, Exchange security
Too often administrators treat Exchange as a regular old server -- with no serious efforts put into securing it. Consider how much we rely on email in day-to-day business. Add data and legal discovery complexities to the mix, and you can't deny the importance of keeping your Exchange environment in check. The following list details common Exchange security vulnerabilities. Make sure you’re not letting threats fly in under your security radar: Gaps in the patching process -- I often find outdated or missing service packs and hotfixes on Exchange servers; some systems may not have been patched in 10 years or more. In these instances, odds are high that malicious insiders who are physically connected to your network can exploit vulnerabilities. Once exploited, these flaws can provide attackers with full administrative-level remote control of an Exchange system, letting them copy and delete data, add backdoor user accounts and more. The scary thing is that most of this activity goes undetected. Even if you're running Windows Server Update Services (WSUS) or a ... Access >>>
Premium Content for Free.
Exchange Online mobile device support: A comprehensive look
by Richard Luckett
As Exchange organizations look to Office 365, questions arise about mobile device support in the cloud. Exchange Online may have the features your enterprise wants and needs.
- Exchange Online mobile device support: A comprehensive look by Richard Luckett
Six commonly overlooked Exchange security vulnerabilities
by Kevin Beaver, CISSP
Think you’re taking the steps needed to fully secure Exchange? Think again.
- Six commonly overlooked Exchange security vulnerabilities by Kevin Beaver, CISSP
More Premium Content Accessible For Free
The benefits and challenges of virtualizing Exchange Server
While virtualizing Exchange Server can reduce operational costs, improve flexibility and consolidate resources, a proper plan is necessary in order ...
Who, what, where? How the cloud complicates identity management
IT security and regulatory compliance require identity and access management. However, the move to the cloud and the spread of mobile devices has ...
The many paths to Exchange 2013
Exchange 2013 offers features that could benefit administrators and make the idea of hosted Exchange more appealing. We look at how to install and ...