ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Policies Research

  • Business email compromise prevention tips

    Sponsored by: TechTarget ComputerWeekly.com

    It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.

  • Danger within: email and security awareness training strategies for effective account takeover protection

    Sponsored by: Mimecast

    It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.

  • Email security: Never more important

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Creating and Enforcing Email Security Policies

    Sponsored by: TechTarget Security

    This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    Sponsored by: TechTarget Security

    In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.

  • Email is your go-to comms tool, so don't scrimp on securing it

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we will explore some current trends and best practice for email security to help you ensure you're as prepared as possible for the next malicious email to hit your inbox, which it assuredly will.

  • 12 Essential Features of Advanced Endpoint Security Tools

    Sponsored by: Claranet

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.

  • Remote Work Cybersecurity: Best Practices & Trends

    Sponsored by: Kaspersky

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

  • Email Security: Never more important

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • How to Build an Enterprise Cybersecurity Plan

    Sponsored by: Fortinet, Inc.

    A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: IBM

    Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia Net

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Enterprise Email and Office 365 Security

    Sponsored by: Check Point Software Technologies Ltd.

    One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.

  • Secure Mobile Email for the Lean IT Department

    Sponsored by: Shavlik Technologies

    This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.

  • Personally Identifiable Information (PII) and Personal Health Information (PHI)

    Sponsored by: Voltage Security, Inc.

    This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.

  • Cisco Email Security

    Sponsored by: Cisco

    This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.

  • Advanced Malware Protection for your Web and Email Gateways

    Sponsored by: Cisco Systems, Inc.

    This article explores the recent merger between one company's advanced malware protection and their web and email gateways.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.

  • Advanced Malware Protection for your Email Services

    Sponsored by: Cisco Systems, Inc.

    This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.

  • Policy Based Encryption: Protecting your Business Against Email Risks

    Sponsored by: Apptix

    This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.

  • Discover How Mail Express Solves 2 of Your Biggest IT Headaches

    Sponsored by: Globalscape

    Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.

  • Who’s Snooping on Your Email?

    Sponsored by: Sophos

    This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

  • Bloomberg Personal Vault

    Sponsored by: Bloomberg

    Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.

  • Best Practices for Secure Email Policy and Compliance

    Sponsored by: Axway

    Access this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.