Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed   
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 

Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Email Reports
1 - 25 of 174 Matches Previous Page  |  Next Page
Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.
Posted: 16 Apr 2021 | Published: 20 Apr 2021

ComputerWeekly.com

Email Signatures
sponsored by Exclaimer
EBOOK: Email is a critical communications mechanism for every business on the planet. Some businesses even go as far as talking to their customers only through email—which is why email signatures are so important. In this edition of Email Signatures for Dummies, explore how you can harness the tool to maximize your social reach in marketing, and more.
Posted: 09 Mar 2021 | Published: 09 Mar 2021

TOPICS:  Email
Exclaimer

Prevent Fraud And Phishing Attacks With Dmarc
sponsored by Mimecast
ANALYST REPORT: Inside this Forrester report, learn about the DMARC standard, how it works, and vendors that can help security and risk leaders implement it today.
Posted: 08 Mar 2021 | Published: 08 Mar 2021

Mimecast

The Top 10 Email Signature Headaches For Large And Small Businesses
sponsored by Exclaimer
WHITE PAPER: Explore the top 10 issues that occur when manually managing email signatures at a corporate level, and how to mitigate them, in this white paper.
Posted: 08 Mar 2021 | Published: 08 Mar 2021

TOPICS:  Email
Exclaimer

Cloud Mailbox Defense - Demo video
sponsored by Cisco Umbrella
VIDEO: View an on-demand demo of Cisco Cloud Mailbox Defense.
Posted: 25 Feb 2021 | Premiered: 25 Feb 2021

Cisco Umbrella

How To Enhance A Data Loss Prevention Strategy Using Argon For Email
sponsored by Clearswift
EGUIDE: Organizations need to secure sensitive data and prevent cyberattacks, while maintaining communication with customers and suppliers. The following guide highlights why email security is a critical part of any data loss prevention (DLP) strategy and offers an inside look at the key features and capabilities of ARgon for Email.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Clearswift

5 Best Practices To Secure Remote Workers
sponsored by Microsoft
RESOURCE: COVID-19 has dramatically changed the dynamics and landscape of remote work for the foreseeable future. So, what are the best practices for securing remote work? Read on to unlock 5 that will make your organizations and workers more secure and more productive.
Posted: 16 Dec 2020 | Published: 16 Dec 2020

Microsoft

Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE: Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020

Atakama

Taking the Mystery Out of Protecting Your Office 365 Data
sponsored by arcserve
RESOURCE: Microsoft Office 365 lets you work anywhere, anytime with on-premises and cloud SaaS, IaaS and PaaS-based solutions. But while Microsoft takes care of the infrastructure for these services, it’s up to you to take care of your data. Scope out this infographic to learn how you could achieve cloud-to-cloud protection for Office 365.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

arcserve

Nine reasons why security leaders need to re-evaluate email security
sponsored by Zivver
WHITE PAPER: Access this white paper for the why, what and how of the 9 challenges organizations face to adequately protect data while still using ‘normal email’.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Zivver

Ransomware State of Play
sponsored by Cylance
WEBCAST: Ransomware is evolving – campaigns are shifting from widespread to highly-targeted, often deployed via compromised MSSP. Additionally, Ransomware-as-a-Service (RaaS) is becoming more private, and threat actors are teaming up to extend their tooling. How can you stay secure? Watch this webcast to learn more about the state of play in ransomware.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Cylance

e-book: Securing Microsoft 365 Email Against Advanced Threats
sponsored by Cisco
EBOOK: Businesses are migrating to cloud email platforms for improved productivity, mobility, and continual access to the latest tools and features. But there’s a catch. Cloud-based email has left users and devices open to new threats and vulnerabilities. Read this e-book to explore these risks, particularly in the context of Microsoft 365.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

Cloud Email Needs Cloud Security
sponsored by Cisco
RESOURCE: 90% of breaches occur via email, and in today’s cloud-centric world, built-in email security may not be enough. In order to secure Microsoft 365 from threats inside and outside of your mailbox, businesses need to consider email security that’s built for the cloud. View this infographic to learn more and to discover another security opportunity.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

Hidden Text and Zero Font Attacks
sponsored by Inky Technology
RESOURCE: You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Exploiting a Pandemic: Coronavirus Stimulus Package Economic Impact Payments
sponsored by Inky Technology
WHITE PAPER: COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Global Phishing Pandemic? You Be the Judge.
sponsored by Inky Technology
RESOURCE: Since the start of the COVID-19 health crisis, complaints to the FBI’s Internet Crime Complaint Center (IC3) have more than tripled. Why are there so many of these coronavirus-related email phishing threats and where are they coming from? View this article to get a link to a free report of COVID-19 phishing examples around the world.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology

Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
sponsored by Inky Technology
RESOURCE: Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology

Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE: Cyberattacks are costly - $10.2 billion in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Exploiting a Pandemic: White House COVID-19 Phishing Scams
sponsored by Inky Technology
EBOOK: It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Inspecting a Phishing Campaign using Cisco Talos
sponsored by Cisco Umbrella
VIDEO: Join this video demo as security experts look into a phishing campaign that was set up to phish users’ credentials by leveraging interest in the global pandemic.
Posted: 26 Jun 2020 | Premiered: 26 Jun 2020

Cisco Umbrella

Email Security: Never more important
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Who will win the world's biggest cloud contract?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

ComputerWeekly.com

Email security: Never more important
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
Posted: 22 Nov 2019 | Published: 21 May 2018

Cisco Umbrella
1 - 25 of 174 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences