You've requested...

Share this with your colleagues:

Download this next:

Expert ways to maximize security in Exchange

As email threats continue to evolve and increase in number, organizations need to keep up their guard and leverage the most advanced tools at their disposal.

This expert e-guide provides tips for how you can leverage and maximize the benefits of enhanced Forefront Protection 2010 capabilities, and reviews the most commonly overlooked Exchange security vulnerabilities, including:

  • Gaps in the patching process
  • SMTP and POP3 access
  • Shared Exchange administrator accounts
  • And more

These are also closely related to: "Symantec Mail Security for SMTP"

  • Improving Enterprise Email Security: Systems and Tips

    You simply cannot rely on outdated e-mail security technology any longer. Threats are growing increasingly sophisticated, targeted dynamic, and attackers are looking to exploit any vulnerability - including zero-day vulnerabilities - that they possibly can.

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Six Email Security Best Practices for Email SaaS

    While e-mail security has been around almost as long as the Internet, the fundamental components and features needed for effective e-mail security have not waivered much, even in the face of cloud computing. But some security professionals have made the mistake of not managing e-mail security the way it should be, leaving their organization exposed to significant risk.

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

Find more content like what you just read:

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.

    Download

  • Phishing in COVID-19: Financial aid scams

    COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.

    Download

  • Creating and Enforcing Email Security Policies

    This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.

    Download

  • Market trends: The Future of E-mail

    Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.

    Download

  • “Coronaphish”: COVID-19 phishing scams

    Phishing scams are constantly evolving, seeking out more effective ways to bypass security measures and trick recipients. In this edition of Understanding Phishing, explore how the COVID-19 pandemic has changed phishing campaigns by dissecting a few real-world examples.

    Download

  • Intro to email & file transfer security

    As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.

    Download

  • How to prevent phishing attacks: User awareness and training

    This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.

    Download

  • Email security: A holistic approach

    Did you know that 91% of all cyberattacks start with an email?In the world today, businesses are struggling to keep up with hackers. They need an approach that provides holistic protection, is adaptable and durable, and allows them to recover their data in the event of an attack.Read this white paper for a close look at one such approach.

    Download

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

    Download

  • Cisco Secure Email Cloud Mailbox Innovating The Way To Protect Microsoft 365

    Given its importance and its relative ease of access, remains the top threat vector across organizations. This following e-guide gathers insight from experts at Cisco and Gartner to provide you with a comprehensive guide to securing cloud email platforms – read on to unlock the full e-guide.

    Download

  • Why outbound email security matters

    When it comes to email security, organizations put their primary focus on potential threats coming in. And that’s fine, but outbound email security is arguably just as important. Browse this white paper to get a closer look at outbound email data protection, which focuses on building controls to offset risks from the insider threat.

    Download

  • 9 reasons to re-evaluate your email security

    Access this white paper for the why, what and how of the 9 challenges organizations face to adequately protect data while still using ‘normal email’.

    Download

  • IT Decision Checklist: Messaging Security

    Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

    Download

  • 9 DDoS threats to watch for

    Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.

    Download

  • Phishing trend & best practices in 2020

    With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.

    Download

  • Spotting hidden text and zero font attacks

    You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.

    Download

  • Phishing tricks: Text direction deception

    Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.

    Download

  • COVID-19-related cyberthreats: Trends & recommendations

    To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.

    Download

  • CEO impersonation: Inside BEC attacks

    Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.

    Download

  • Phishing: Imitating the government

    It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.

    Download

  • Anti-phishing: The effectiveness of banners

    Putting banners in email to alert recipients to the potential dangers lurking in messages can be a highly effective way to keep employees safe from phishing attacks. But for this to be effective, you have to know which emails to flag. View this white paper to learn how INKY’s Phish Fence determines which emails to warn users about.

    Download

  • Understanding Phishing: Invisible characters

    Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.

    Download

  • Ward off phishing attacks with computer vision

    View this guide to learn how INKY uses visual analysis to figure out important features of each incoming email and matches it with other information to ward off phishing attacks.

    Download

  • 34 phishing scams by region

    The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.

    Download

  • How to combat phishing

    Phishing is an inherent risk all organizations face in the digital age. In this white paper, explore the tactics used by attackers at each of the early stages of the kill chain and uncover the practical defensive steps your organization can take to combat phishing attacks.

    Download

  • Phishing report: The newest wave of attacks

    Phishing attacks have always been one of the most prominent and pervasive cyberthreats facing organizations – but the 2020 pandemic gave rise to a new wave of phishing tactics and entry points. Read this report for a closer analysis (with examples) of the phishing tactics facing today’s inboxes.

    Download

  • INKY vs. Microsoft Defender for Office 365

    This solution brief pits INKY against Microsoft’s Defender for Office 365 (MSDO) – exploring the similarities and differences between the offerings and highlighting a few key examples of phishing scams INKY caught, but MSDO didn’t – read on to get started.

    Download

  • eGuide: Email Security and Compliance Best Practices

    Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.

    Download

  • Utilizing Microsoft Exchange and ServiceNow to protect against phishing

    With the widespread use of phishing as a method of attack, SOC teams struggle to identify true phishing emails that have slipped through to users’ mailboxes and contain the threats they create. In this solution brief, discover how to protect against phishing with Microsoft Exchange and ServiceNow.

    Download

  • Phishing tax scams: Don’t take the bait

    Each tax season, thousands of Americans are scammed out of millions of dollars. In fact, according to an FTC report, nearly 1 in 10 people were victims of imposter scams last year, amounting to roughly $667 million lost. The following white paper highlights common tax scams to watch out for (according to the IRS) and how to prepare for them.

    Download

  • Zero trust for Microsoft Exchange security

    On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.

    Download

  • White paper: Business email compromise

    According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.

    Download

  • How to prevent brand exploitation

    A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.

    Download

  • Microsoft 365 vs. advanced email cyberthreats

    Every day, over 3.4 billion email scams or phishing emails are sent. However, email-based threats are growing in their cost as well as their volume. Read this e-book to unlock comprehensive expertise into the growing threats targeting email inboxes and how top protect cloud email tools, like Microsoft 365, against these mounting threats.

    Download

  • The hidden costs of free

    As organizations opt for third-party email platforms, like Microsoft 365, it becomes increasingly critical that they ensure security is up to snuff. Unfortunately, Microsoft 365’s native security features may not be best-fit for every user. Read this e-guide to learn more about how to make the most out of Microsoft 365.

    Download

  • How to stop BEC & EAC: A CISO’s guide

    Gartner predicts that business email compromise (BEC) attacks will double each year, totaling $5 billion in actual losses by 2023. So, how should CISOs protect their organizations against this growing threat? Download this exclusive e-book for insight into BEC and email account compromise (EAC) trends, challenges and best practices.

    Download

  • Protect your business against phishing attacks

    Phishing remains a popular method of stealing credentials, committing fraud, and distributing malware. Access this report to learn how fraudsters are building and hosting their phishing sites, the tactics they use to remain hidden, and how you can protect your business.

    Download

  • Email risk assessment report

    Email security is much talked about right now, and it’s important that you’re up to date on the scale at which it’s under attack, the most popular types of malware bad actors are using and the vulnerability of email in general. Access the Email Risk Assessment Report to understand these trends and to pick up 7 recommendations on email safety.

    Download

  • BEC & EAC: Who’s behind the mask?

    The FBI has recognized business email compromise (BEC) and email account compromise (EAC) as one of the most pervasive and costliest cyberthreats in circulation. In fact, the average attack nets the attacker nearly $130,000. To learn more about BEC and EAC and how to prevent it, read this e-book.

    Download

  • Email security awareness training

    It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.

    Download

  • The definitive email security strategy guide

    With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).

    Download