Phishing and Email Fraud Protection News
June 28, 2007
A bogus patch update claiming to be from Microsoft is the latest phishing scam to keep IT managers on their toes.
May 23, 2007
DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks.
March 15, 2007
Microsoft said it is investigating a flaw in Internet Explorer 7 (IE 7) attackers could exploit to launch phishing expeditions.
October 18, 2006
Researchers say the bad guys are getting a lot better at catching users on the phishing hook. Three methods are of particular concern.
Phishing and Email Fraud Protection Get Started
Bring yourself up to speed with our introductory content
Using multiple Exchange and network security controls can help many organizations protect against potential data breaches. Continue Reading
Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. Continue Reading
A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam. If a message arrives from an address or domain on the list, it will be quarantined and then delivered to the ... Continue Reading
Evaluate Phishing and Email Fraud Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security breaches and threats continue to evolve. Is your incident response plan keeping up with the times? Evaluate your risks and current plans to ensure you're prepared for the worst. Continue Reading
As attackers find newer and faster ways to exploit vulnerabilities, know your antispam and antimalware options to protect Exchange 2013. Continue Reading
Once you've decided to look at third-party security tools, you'll have to decide between on-premises or cloud-based options. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Phishing and Email Fraud Protection
Learn to apply best practices and optimize your operations.
Use the recent rash of high-profile data breaches as examples of what not to do in your Exchange environment. Continue Reading
Whether you're a new Exchange admin or a seasoned pro, these four steps will help develop your Exchange security skills. Continue Reading
Phishing attacks are the most popular causes of data breaches in the enterprise. Here are three reasons why. Continue Reading
Problem Solve Phishing and Email Fraud Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Denial-of-service attacks pose a serious security threat to virtualized Exchange servers. Discover what you can do to mitigate potential intrusions. Continue Reading
Properly protecting Exchange Server 2010 means maintaining top-notch security. Perform the tasks on this checklist regularly to keep your deployment safe and sound. Continue Reading
The Outlook 2010 Trust Center offers plenty of security settings to administrators. That doesn’t mean they’re all important though. Continue Reading