In a research project, security consultants claimed to have collected more than 120,000 individual emails (20 GB of data) that included trade secrets, business invoices and other information as a result of misspelled domains names.
The Rustock Botnet was sending as many as 13.82 Billion spam emails each day before being taken down early this month, in an effort headed by Microsoft in cooperation with authorities and the legal system.
DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
Email is a primary mode of communication in business today and consequently is a mission critical enterprise application. A well-designed corporate email infrastructure should have a security architecture built on the bastion host principle.
The past two years have seen significant rise in the adoption of cloud computing and Software-as-a-Service (SaaS), however the ever-present concern over security has greatly impacted its growth within email security.
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.