IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed   
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

The Ransomware Recovery Guide: How to Spot, Prevent and Recover from Ransomware
sponsored by Databarracks
WHITE PAPER: Ransomware affects everyone, making awareness, education, and defense crucial to keeping your sensitive data secure. Access this white paper to learn what ransomware looks like, how to recover from it, and 2 proactive steps to take in order to thwart a potential attack.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Databarracks

Handling Threats That Land in User Inboxes
sponsored by PhishLabs
WEBCAST: Traditionally, phishing is associated with email-based attacks containing malicious links. However, 98% of modern phishing attacks that reach users don’t contain any sort of malware. So, how can your organization be better prepared against modern threats? Watch this webinar to learn more.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

Secure Managed File Transfer: Ultimate Buyer's Guide
sponsored by Help/Systems
WHITE PAPER: Every day, organizations may exchange a considerable amount of files. Because of the sensitive information often contained in files, data transfers should be protected. In this white paper, learn how secure managed file transfer can help your organization protect the data your sharing.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Help/Systems

The Multiple Advantages of Data Storage Modernization
sponsored by IBM
RESOURCE: By making timely investments in modern storage infrastructures from trusted vendors, organizations can remain in firm control of their future. Read this resource to learn how to leverage data as a differentiating asset and to discover the multiple advantages of data storage modernization
Posted: 12 Feb 2020 | Published: 12 Feb 2020

IBM

CIS Critical Security Controls Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The Center for Internet Security (CIS) Critical Security Controls have become a trusted resource for organizations looking to identify threats and enhance security. This evaluation guide measures the Absolute Platform against the CIS Top 20 Critical Security Controls to illustrate its capabilities.
Posted: 14 Feb 2020 | Published: 02 Nov 2018

Absolute Software Corporation

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Product Guide: D3 SOAR
sponsored by D3 Security
DATA SHEET: D3 SOAR is an enterprise-grade security operations platform that can help organizations utilize their resources to shut down threats before they cause serious damage. Download this product guide to learn all about their 200+ security integrations, codeless automation, and fully embedded MITRE ATT&CK correlations.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

D3 Security

Ransomware - NEW for 2020: Ransomware Defense for Dummies - 2nd Edition
sponsored by Cisco Umbrella
WHITE PAPER: Many organizations that are targeted by ransomware attacks assume that paying the ransom is the fastest and most cost-effective way to get their data back, but this isn’t always the case. Download your copy of ‘Ransomware Defense for Dummies’ to learn how ransomware attacks work and how to defend against them.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

CIO Trends #9
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info