Phishing and Email Fraud Protection News
June 28, 2007
A bogus patch update claiming to be from Microsoft is the latest phishing scam to keep IT managers on their toes.
May 23, 2007
DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks.
March 15, 2007
Microsoft said it is investigating a flaw in Internet Explorer 7 (IE 7) attackers could exploit to launch phishing expeditions.
October 18, 2006
Phishing is no longer just a consumer problem, say experts. The scams are hurting companies' reputations and bottom lines.
Phishing and Email Fraud Protection Get Started
Bring yourself up to speed with our introductory content
Habits make or break Exchange security. Follow these six steps every day to create good admin habits and a more secure environment. Continue Reading
Using multiple Exchange and network security controls can help many organizations protect against potential data breaches. Continue Reading
Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. Continue Reading
Evaluate Phishing and Email Fraud Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Ubiquitous global email is right around the corner. But what effect will it have on enterprises? Expert Michael Cobb explains. Continue Reading
Exchange admins can use the recent State Department hack as a lesson in the importance of consistent security protocols. Continue Reading
Security breaches and threats continue to evolve. Is your incident response plan keeping up with the times? Evaluate your risks and current plans to ensure you're prepared for the worst. Continue Reading
Manage Phishing and Email Fraud Protection
Learn to apply best practices and optimize your operations.
To ensure a resilient Exchange setup, admins must know how to run tests, find vulnerabilities and examine Exchange's reaction to simulated attacks. Continue Reading
Securing your Exchange setup is vital to keep your business up and running. However, recent security reviews show there's room for improvement. Continue Reading
Use the recent rash of high-profile data breaches as examples of what not to do in your Exchange environment. Continue Reading
Problem Solve Phishing and Email Fraud Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Once you've decided to look at third-party security tools, you'll have to decide between on-premises or cloud-based options. Continue Reading
Denial-of-service attacks pose a serious security threat to virtualized Exchange servers. Discover what you can do to mitigate potential intrusions. Continue Reading
Properly protecting Exchange Server 2010 means maintaining top-notch security. Perform the tasks on this checklist regularly to keep your deployment safe and sound. Continue Reading