Email Security Articles
April 17, 2013
As social media has begun to play an integral role in many businesses' operations, activity on these channels also opens up new vulnerabilities to targeted attacks that threaten data protection.
April 11, 2013
The internet and related technological trends such as cloud computing, social media and bring-your-own-device have provided hackers with new sources of information that can lead to more targeted attacks.
April 10, 2013
Phishing campaigns have become increasingly sophisticated as attackers can gather information about employees and businesses more easily through the web, particularly on social media.
April 9, 2013
Regardless of industry or business size, IT security professionals need to address emerging risks that have become more successful at infiltrating networks, threatening data protection.
April 8, 2013
As regulations for data and privacy protection begin to require enterprises to provide breach notification, the risk of enforcement, which can lead to costly penalties and reputation damage, is a higher risk.
April 3, 2013
According to recent research, enterprises in a variety of industries have adopted bring-your-own-device (BYOD) policies without sufficient consideration for threats that employee personal devices can pose to data protection.