IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Email Policies

RSS Feed   
Email Policies White Papers (View All Report Types)
 
The 6 Most Common Types of Phishing Attacks
sponsored by Inky Technology
WHITE PAPER: Phishing attacks are on the rise and attackers are constantly evolving their tactics to trick victims. In this white paper, explore 6 of the most common types of phishing attacks.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Employees Behaving Badly? Why Awareness Training Matters
sponsored by Mimecast
WHITE PAPER: Making awareness training part of your cyber-resilience planning is essential to keeping your organization secure. In general, employees are not doing bad things on purpose, but their actions can greatly impact the security of your organization and data. In this white paper, discover 6 ways to make security awareness a part of your culture.
Posted: 18 Apr 2019 | Published: 17 Oct 2018

Mimecast

Getting Started with DMARC
sponsored by Proofpoint
WHITE PAPER: Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.
Posted: 28 Jun 2019 | Published: 28 Feb 2019

Proofpoint

Internal Threats Personified
sponsored by Mimecast
WHITE PAPER: When it comes to securing email and protecting against cyberattacks, most organizations focus their attention on inbound emails. Although this is a great start, not all attacks are from incoming emails. In this white paper, explore 4 email-related activities that employees often engage in that contribute to the spread of these insider threats.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

Mimecast

A Best Practice Guide to Mitigating Ransomware in Your Enterprise
sponsored by ManageEngine
WHITE PAPER: One of the most lethal forms of cyberattacks, ransomware, can disrupt the most powerful institutions in the world, from government organizations to Fortune 500 companies. In this white paper, learn 4 simple best practices that your organization can implement to help prevent ransomware attacks.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement