Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed   
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 

Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Email Reports
1 - 25 of 202 Matches Previous Page  |  Next Page
Email security: Never more important
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

How Phishing Security Software is Different from Email Security Software
sponsored by Inky Technology
RESOURCE: All legacy email security apps on the market have value and are useful within the space that they operate. However, there are many differences between traditional email security software and anti-phishing software platforms. Read on to learn more.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Inky Technology

5 Examples of Phishing Emails That Killed Companies
sponsored by Inky Technology
RESOURCE: In this article, uncover the 5 most costly phishing attacks of the last few years.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Inky Technology

2019 End of Year Email Phishing Report
sponsored by Inky Technology
WHITE PAPER: Traditional email security products block plenty of phishing emails. But new research shows that hundreds, if not thousands, of potentially dangerous emails per company get through every year. Download INKY’s 2019 End of the Year Report for insights on evolving phishing attacks and new countermeasures.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Inky Technology

Email Security Risk Assessment for Microsoft Office 365
sponsored by Mimecast
RESOURCE: View this infographic that reveals the results of Email Security Risk Assessment tests showing the number and type of unwanted and dangerous emails missed by organizations’ Microsoft Office 365 implementations.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Mimecast

Understanding Phishing: Fake Attachments
sponsored by Inky Technology
WHITE PAPER: Malicious fake attachments are a trend that has security pros on the alert.So how can you spot them at first glance and before they do serious damage? This special phishing report for security pros reveals exactly how it’s done.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Inky Technology

Dutch DIY Giant Shelves Email Attacks
sponsored by Barracuda
CASE STUDY: As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Barracuda

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Whitepaper: Does Office 365 Deliver the Email Security and Resilience Enterprises Need?
sponsored by Mimecast
WHITE PAPER: In this white paper, learn about the native security features Office 365 delivers, as well as how to extend them for the added resilience you need to keep your communications safe.
Posted: 26 Aug 2019 | Published: 12 Jun 2019

Mimecast

Proofpoint Information Protection Research Team
sponsored by Proofpoint
RESOURCE: Check out this blog to learn why your organization could benefit from a layered, intelligent security measure, such as user education to combat evolving threats that are increasingly successful in compromising user cloud accounts.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Proofpoint

Who will win the world's biggest cloud contract?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

ComputerWeekly.com

Special Report: 2019 Email Security Trends
sponsored by Barracuda
ANALYST REPORT: How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Barracuda

Conversational Geek Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: If you are moving to or already using Office 365 then it's essential for you to formulate a plan toward a risk-free cyber resilience experience. Download this e-book to learn about the security, data assurance and continuity gaps that exist in Office 365 and how Mimecast can help reduce risk and add resilience.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Mimecast

Email security: Never more important
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

Top 10 Reasons Customers Choose Proofpoint to Protect Office 365
sponsored by Proofpoint
RESOURCE: For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Download this infographic for the top 10 reasons why customers choose Proofpoint to protect Office 365.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Proofpoint

Why Mimecast Web Security?
sponsored by Mimecast
RESOURCE: In this infographic, find out how Mimecast Web Security can help your organization defend against advanced phishing and malware attacks that come via email, web, instant messaging systems, social network sites, and ad networks.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Mimecast

Email Security Risk Assessment
sponsored by Mimecast
WHITE PAPER: Many organizations think their current email security systems are up to the task of protecting them from phishing. Unfortunately, many of them fall short and don't keep their organizations safe. In this report, uncover research from Mimecast's study on the amount of unwanted and dangerous emails missed by incumbent email security systems.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Mimecast

Common Office 365 Email Security Issue: Phishing
sponsored by Inky Technology
RESOURCE: Discover the common Office 365 email security attacks that have been infiltrating businesses emails.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Inky Technology

Internal Threats Personified: How Employees Can Jeopardize Your Cybersecurity
sponsored by Mimecast
EBOOK: Your employees can be your greatest asset, or your weakest link when it comes to email security. In this e-book, find several email-related activities that employees often engage in that contribute to the spread of these insider (hidden) threats and discover what your organization can do to protect itself.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

How Spear Phishing Targets the C-Suite
sponsored by Inky Technology
RESOURCE: In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

Proofpoint Security and Compliance for Microsoft Office 365
sponsored by Proofpoint
DATA SHEET: Office 365 is changing the way people collaborate and run their businesses, but making sure your security and compliance tools are optimized to protect critical cloud or email apps like O365 is a whole other ball game. Find out how Proofpoint built their security tools around the goal of securing apps like O365.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Proofpoint

Understanding Email Fraud
sponsored by Proofpoint
ANALYST REPORT: Discover the impacts of email fraud and how organizations are responding to it with an effective, multi-layered defense: people, process, and technology.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Proofpoint

End User Applications Datasheet
sponsored by Mimecast
DATA SHEET: Email is a core business application and remains the number one form of business communication. Mimecast's apps play a key role in delivering the email experience employees expect and supporting IT in safeguarding the enterprise. Download this data sheet to learn about the key benefits of Mimecast's suite of productivity apps today.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Mimecast

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
Posted: 22 Nov 2019 | Published: 21 May 2018

Cisco Umbrella
1 - 25 of 202 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info