Phishing and Email Fraud Protection News
June 28, 2007
A bogus patch update claiming to be from Microsoft is the latest phishing scam to keep IT managers on their toes.
May 23, 2007
DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks.
March 15, 2007
Microsoft said it is investigating a flaw in Internet Explorer 7 (IE 7) attackers could exploit to launch phishing expeditions.
October 18, 2006
Researchers say the bad guys are getting a lot better at catching users on the phishing hook. Three methods are of particular concern.
Phishing and Email Fraud Protection Get Started
Bring yourself up to speed with our introductory content
Whether you use on-premises Exchange, Office 365 or hybrid Exchange deployments, follow these tips to boost email server security. Continue Reading
Get that Exchange administrator job offer by standing out with security and compliance prowess in your interview. Continue Reading
Use these guidelines to test how secure your Exchange setups actually are. Continue Reading
Evaluate Phishing and Email Fraud Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The ATP add-on for Exchange Online Protection gives on-premises Exchange Server and Office 365 customers another layer of security. Continue Reading
Ubiquitous global email is right around the corner. But what effect will it have on enterprises? Expert Michael Cobb explains. Continue Reading
Exchange admins can use the recent State Department hack as a lesson in the importance of consistent security protocols. Continue Reading
Manage Phishing and Email Fraud Protection
Learn to apply best practices and optimize your operations.
Keep these six factors in mind if your organization plans to keep some services on-premises and move others to the cloud. Continue Reading
To ensure a resilient Exchange setup, admins must know how to run tests, find vulnerabilities and examine Exchange's reaction to simulated attacks. Continue Reading
Habits make or break Exchange security. Follow these six steps every day to create good admin habits and a more secure environment. Continue Reading
Problem Solve Phishing and Email Fraud Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Once you've decided to look at third-party security tools, you'll have to decide between on-premises or cloud-based options. Continue Reading
Denial-of-service attacks pose a serious security threat to virtualized Exchange servers. Discover what you can do to mitigate potential intrusions. Continue Reading
Properly protecting Exchange Server 2010 means maintaining top-notch security. Perform the tasks on this checklist regularly to keep your deployment safe and sound. Continue Reading