Access "Acceptable use policies will minimize email risks"
This article is part of the July 2004 issue of Olympic trials: Securing the summer games
Where would business be without email? It's an essential tool that, in many cases, has displaced phones, "snail mail" and faxes as the primary means of communication. The ubiquity and standardization of email has also made it one of the most exploited applications: It's a perfect vehicle for propagating viruses, spam, directory harvesting attacks, spyware and phishing scams. And, email has become the digital archive of corporate America, retaining (or capturing) evidence for regulatory compliance, contractual obligations and civil and criminal proceedings. Enterprises can mitigate email risks through sound and enforceable security and acceptable use policies, which define user and corporate restrictions and responsibilities. A Privilege, Not a Right Users rarely think about ownership when sending photos, party invitations or gossip from their company email accounts. This makes the establishment of ownership an essential element of an enterprise's email policy. While it may seem elementary, the first step in creating an email security policy is defining what ... Access >>>
Premium Content for Free.
IT network security: Securing the summer Olympics
by Dennis McCafferty, Contributing Writer
While physical security at the Olympics is paramount, information security for its vast IT network is also a major challenge.
Acceptable use policies will minimize email risks
by George Wrenn, CISSP
Learn why setting comprehensive email acceptable use policies can help minimize email risks and secure your email applications.
How to prevent phishing scams and protect customers
by Nalneesh Gaur
In this tip, Web security guru, Nalneesh Gaur examines how hackers are using phishing scams to exploit financial sectors of the industry, why you should care and what you can do to prevent these attacks.
- IT network security: Securing the summer Olympics by Dennis McCafferty, Contributing Writer
USB security tokens may not be as secure as you think
by Tom Bowers, Contributor
USB tokens aren't as strong as you think. Multifactor authentication is meaningless when the supporting software is insecure.
Will intrusion prevention systems live up the hype?
Will intrusion prevention ever live up to its promise?
- USB security tokens may not be as secure as you think by Tom Bowers, Contributor
The Fulda Gap and defense in depth strategy
Enterprise security managers need to think like warriors when it comes to protecting their systems. Lawrence Walsh explains why.
- The Fulda Gap and defense in depth strategy
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.