Phishing and Email Fraud Protection News
June 28, 2007
A bogus patch update claiming to be from Microsoft is the latest phishing scam to keep IT managers on their toes.
May 23, 2007
DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks.
March 15, 2007
Microsoft said it is investigating a flaw in Internet Explorer 7 (IE 7) attackers could exploit to launch phishing expeditions.
October 18, 2006
Phishing is no longer just a consumer problem, say experts. The scams are hurting companies' reputations and bottom lines.
Phishing and Email Fraud Protection Get Started
Bring yourself up to speed with our introductory content
Your Exchange environment is a key component in your organization's communication platform, so shouldn't protecting it get the highest priority? Continue Reading
There are a bevy of native tools from Microsoft that can aid Exchange administrators in securing email messages and protecting against malicious links and attachments. Continue Reading
The Microsoft EMS adds capabilities such as document encryption and threat detection to Office 365, but a subscription may not be necessary for every organization. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Phishing and Email Fraud Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The ATP add-on for Exchange Online Protection gives on-premises Exchange Server and Office 365 customers another layer of security. Continue Reading
Ubiquitous global email is right around the corner. But what effect will it have on enterprises? Expert Michael Cobb explains. Continue Reading
Exchange admins can use the recent State Department hack as a lesson in the importance of consistent security protocols. Continue Reading
Manage Phishing and Email Fraud Protection
Learn to apply best practices and optimize your operations.
Email attacks are inevitable, so supporting incident response policies and procedures is necessary to ensure your enterprise is adequately prepared for an attack. Continue Reading
Do you have the guts and technology know-how to undertake a self-assessment of your organization's Exchange-related risks? If so, start here. Continue Reading
Don't let the deficiencies from applying and managing Exchange threaten your network. Implement third-party security tools to thwart breaches. Continue Reading
Problem Solve Phishing and Email Fraud Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Secure your email with EOP tools like DKIM and DMARC that verify incoming messages aren't spam or spoofs. Avoid unauthorized email with digital signatures and authenticated domains. Continue Reading
Use Exchange and Office 365 to restrict and secure data that leaves an organization, and share documents more easily thanks to new features. Continue Reading
Keep these six factors in mind if your organization plans to keep some services on-premises and move others to the cloud. Continue Reading