Security Messaging Security School:
Messaging Security School
Our special Messaging Security School offers a variety of lessons that will teach you how to keep malicious code out of your end-users' inboxes, protect your mobile devices from malware, and find strategies that will combat today's emerging email and IM threats.
SearchSecurity.com is always looking for ideas for future lessons in our Integration of Networking and Security School. Contact us if you have feedback on this school or ideas for future content.
-
Counterintelligence strategies for thwarting email threats
Today's mobile workforce requires that employees access their email from any PC, often without the benefit of a VPN. In this lesson, learn about the current set of email threats, from the newest phishing tactics to the latest bot-installing Trojans that threaten enterprise webmail implementations.
About the author:
Sandra Kay Miller is a technical editor for Information Security magazine.Learn more: Counterintelligence strategies for thwarting email threats
-
Countermeasures for malicious email code
Enterprises are now facing numerous evolving threats like zero-day exploits, botnets and phishing schemes. In this lesson, attendees will get an overview of the email threat landscape, tips for malware protection success and guidance on the future of email attacks.
About the author:
Tom Bowers is managing director of consulting firm Security Constructs. -
Defending mobile devices from viruses, spyware and malware
There has been a noticable rise in the number of unique mobile malware threats facing enterprise devices. In this lesson, guest instructor Sandra Kay Miller examines the top mobile threat vectors -- including malware from the network, other devices, SMS and more -- and misconceptions about mobile malware, plus methods to mitigate emerging mobile threats.
About the author:
Sandra Kay Miller has more than 15 years of experience in developing and deploying leading edge technologies throughout the petroleum, manufacturing, luxury resort and software industries.Learn more: Defending mobile devices from viruses, spyware and malware
-
Email Security Best Practices: Tools, Systems and Threats
Get tips on how to practice and administer best practices for email systems and tools as well as how to avoid email threats. Instructor Joel Snyder provides the essential tactics necessary to secure email services, beginning with the basic requirements, moving on to spam filters and virus defenses, and wrapping up with email security policy control.
About the author:
Joel Snyder is a senior partner with consulting firm Opus One in Tucson, Ariz.Learn more: Email Security Best Practices: Tools, Systems and Threats
-
Managing traffic: Keeping your content where it belongs
As business needs demand that customers and partners receive sensitive enterprise data, there is an increased urgency to protect outbound messaging content. From intellectual property theft to compromised customer data, the loss of confidential data threatens an organization financially and legally. In fact, 8 out of 10 SearchSecurity.com and Information Security readers thought protection against information leakage was an important feature for messaging platforms, according to a recent survey. Worse yet, one-third of readers said they don't have an effective strategy.About the author:
Mike Rothman is president and principal analyst of Security Incite, an industry analyst firm in Atlanta.Learn more: Managing traffic: Keeping your content where it belongs
-
Microsoft Exchange Server security: Spam prevention and recovery
Learn how to protect your Microsoft Exchange Server 2003 environment from spam and Web-based attacks. Instructor Lee Benjamin also takes a look at Exchange Server 2007's key security features.
About the author:
Lee is Chairman of ExchangeServerBoston and Director for BostonUsersGroups, an umbrella organization of over 50 user groups in New England. He is also an analyst at Ferris Research.Learn more: Microsoft Exchange Server security: Spam prevention and recovery
-
Mobile device security: Breach prevention policy and strategy
Lisa Phifer reviews inherent mobile device weaknesses and discusses how to develop a mobile device security and breach prevention strategy, as well as how to protect mobile platforms and Bluetooth-enabled handsets against emerging threats and end-user behaviors.
About the author:
Learn more: Mobile device security: Breach prevention policy and strategy
-
Preventing instant messaging security threats and attacks
Instant messaging has already become an indispensable business tool for many enterprises. In this lesson, get an overview of the IM security landscape, an update on the latest attacks and some quick tips on how to prevent wireless security threats and attacks.
About the author:
Michael Cobb is the founder and managing director of Cobweb Applications Ltd.Learn more: Preventing instant messaging security threats and attacks
-
Spam 2.0: New attacks, viruses and prevention strategies
The proliferation of botnets and profit motives are spurring new spam 2.0 attack and virus techniques that are getting through filters and clogging inboxes. Learn about the innovative attack methods and how security professionals can stay on top of these emerging tricks.
About the author:
Michael Cobb is the founder and managing director of Cobweb Applications Ltd.Learn more: Spam 2.0: New attacks, viruses and prevention strategies
Security Management Strategies for the CIO