Security Counterintelligence strategies for thwarting email threats:
Messaging Security School
Counterintelligence strategies for thwarting email threats
Today's mobile workforce requires that employees access their email from any PC, often without the benefit of a VPN. In this lesson, learn about the current set of email threats, from the newest phishing tactics to the latest bot-installing Trojans that threaten enterprise webmail implementations.
About the author:
Sandra Kay Miller is a technical editor for Information Security magazine.
-
Podcast: Fact or fiction -- Am I a bot or not?
Podcast - Learn how to tighten email security policies, educate users about the dangers of seemingly harmless messages, and eliminate email accounts that have been taken over by bots.
-
Webmail security: Best practices for data protection
Tip - Webmail has become a popular choice for enterprises looking to provide users with email access outside the office, but deployment of any Web-based email system presents a unique set of security challenges. In this Messaging Security School tip, Sandra...
-
Quiz: Counterintelligence strategies for thwarting email threats
Quiz - Take this five-question quiz to evaluate your knowledge of the material presented by expert Sandra Kay Miller in this Messaging Security School lesson.
Security Management Strategies for the CIO