INFOGRAPHIC:
Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
EZINE:
In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.
EZINE:
In this week's Computer Weekly, we go behind the scenes at the Francis Crick Institute to find out how data science and AI support its groundbreaking medical research. As courts on both sides of the Atlantic target Google, we analyse the legal threats for Big Tech. And our latest buyer's guide examines cloud and object storage. Read the issue now.
WHITE PAPER:
Migrating to Exchange Server 2007 needs careful considerations for configurations that affect availability or storage capabilities. This paper highlights Exchange 2007 deployment best practices, features and architectural benefits, server roles...
CASE STUDY:
Before implementing AppAssure's MailRetriever, Imagine's Exchange environment suffered unrecoverable corruption. During the ensuing downtime, the network administrators searched for a better backup solution. Imagine Schools now relies on MailRetriever for Exchange to backup Exchange, SQL servers, and school Web sites.
EBOOK:
Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
PODCAST:
This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
PRODUCT LITERATURE:
This white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time.
PRODUCT LITERATURE:
This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.