Phishing and Email Fraud Protection News
June 28, 2007
A bogus patch update claiming to be from Microsoft is the latest phishing scam to keep IT managers on their toes.
May 23, 2007
DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks.
March 15, 2007
Microsoft said it is investigating a flaw in Internet Explorer 7 (IE 7) attackers could exploit to launch phishing expeditions.
October 18, 2006
Researchers say the bad guys are getting a lot better at catching users on the phishing hook. Three methods are of particular concern.
Phishing and Email Fraud Protection Get Started
Bring yourself up to speed with our introductory content
Whether you use on-premises Exchange, Office 365 or hybrid Exchange deployments, follow these tips to boost email server security. Continue Reading
Get that Exchange administrator job offer by standing out with security and compliance prowess in your interview. Continue Reading
Use these guidelines to test how secure your Exchange Server setups actually are. Continue Reading
Evaluate Phishing and Email Fraud Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The ATP add-on for Exchange Online Protection gives on-premises Exchange Server and Office 365 customers another layer of security. Continue Reading
Ubiquitous global email is right around the corner. But what effect will it have on enterprises? Expert Michael Cobb explains. Continue Reading
Exchange admins can use the recent State Department hack as a lesson in the importance of consistent security protocols. Continue Reading
Manage Phishing and Email Fraud Protection
Learn to apply best practices and optimize your operations.
Do you have the guts and technology know-how to undertake a self-assessment of your organization's Exchange-related risks? If so, start here. Continue Reading
Don't let the deficiencies from applying and managing Exchange threaten your network. Implement third-party security tools to thwart breaches. Continue Reading
Use Exchange and Office 365 to restrict and secure data that leaves an organization, and share documents more easily thanks to new features. Continue Reading
Problem Solve Phishing and Email Fraud Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Keep these six factors in mind if your organization plans to keep some services on-premises and move others to the cloud. Continue Reading
Once you've decided to look at third-party security tools, you'll have to decide between on-premises or cloud-based options. Continue Reading
Denial-of-service attacks pose a serious security threat to virtualized Exchange servers. Discover what you can do to mitigate potential intrusions. Continue Reading