Counterintelligence strategies for thwarting email threats: Security School

Security Counterintelligence strategies for thwarting email threats:

Messaging Security School

Counterintelligence strategies for thwarting email threats

Today's mobile workforce requires that employees access their email from any PC, often without the benefit of a VPN. In this lesson, learn about the current set of email threats, from the newest phishing tactics to the latest bot-installing Trojans that threaten enterprise webmail implementations.

About the author:
Sandra Kay Miller is a technical editor for Information Security magazine.

Display in sets of: