System News
 1 2 3 4 5 6 7 8 9 10 11 next
Archived IT - Email Articles
07 Aug 2017
open to premium members only
Misplaced responsibility: why email security requires technology, not training [65481]
ITProPortal, August 7th, 2017

"It's important that we see email for what it is: an inherently vulnerable and often unstable form of communication, something that has a long - and lengthening - history of breaches and attacks...

We think of email as safe in part because nobody likes to imagine that something so integral to their personal and professional lives - indeed, something that it would be hard to imagine modern life without - could pose a security risk..."
(Get More Information . .)

19 Jun 2017
open to premium members only
Major Rendering Challenges Faced By Email Clients And Their Workarounds [64445]
Business 2 Community, June 19th 2017

"Email Marketing is still a widely used medium to reach a large set of audience. With a plethora of email clients available, it remains a challenge for email marketers to reach each and every subscriber in their list. No doubt, email marketing can bring great prospects for your business, but you need to make sure your email gets delivered and renders smoothly across the diverse email clients and devices used by your subscribers.

The recent Email Client Market Share report conducted by Litmus Email Analytics shows that the top 5 widely used email clients are Apple iPhone, Gmail, Apple iPad, Apple Mail, and Outlook. Marketers need to take into consideration the following challenges faced by email clients and their solutions while planning for email campaigns..."
(Get More Information . .)

11 Jun 2017
open to premium members only
Email Impersonation Attacks On The Rise, Mimecast Finds [64274]
eWeek, June 7th 2017

"Email security vendor Mimecast released its latest quarterly Email Security Risk Assessment (ESRA) report on June 6, providing insight from data collected across 44,644 participating users over a 287-day period.

During the quarter, the ESRA test found 9 million emails that Mimecast categorized as some form of unwanted emails (spam), which included various threats and risks. Of the spam caught by Mimecast, there were 8,605 impersonation attacks detected, which is a 400 percent increase over the number of such attacks that Mimecast detected in its first-quarter 2017 report.

This slide show takes a look at some of the highlights of the May 2017 Mimecast ESRA report..."
(Get More Information . .)

10 May 2017
open to premium members only
Why Email Is The Weakest Security Link g And How To Fix It [63270]
Information Age, May 10th 2017

"How can companies protect their email domains against phishing attacks and exploitation?

According to a recent report by corporate investigations and risk consulting firm Kroll, UK businesses are the second biggest victims of cybercrime in the world, with 92% of executives saying they had experienced an attack or information loss in the last year.

Phishing is one of the most common types of cyber attack, with 30% of phishing emails getting opened, according to Verizon's Data Breach Investigations Report. It's the easiest way to hijack accounts - as happened to Hillary Clinton's election campaign chairman John Podesta last year..."
(Get More Information . .)

08 May 2017
open to premium members only
Email, Email, In The Cloud [63268]
ComputerWorld, May 8th 2017

"The transition from on-premises to cloud-based email is an opportunity to tighten security controls...

As my company continues to move enterprise applications to the cloud, the latest development presents a security opportunity. We are giving up our on-premises Microsoft Exchange email in favor of the Microsoft Office 365 service. With the transition, we might be able to curtail the common employee practice of communicating and storing sensitive business-related data in email.

I am encouraging the IT organization to tighten security by implementing controls that were either not available in our on-premises deployment or never implemented. The first order of business is a cleanup of accounts and distribution lists. We have hundreds of email-enabled distribution lists, and too many of them are available to the world. We should be able to cut down the number of lists and set rules about who can use them..."
(Get More Information . .)

08 May 2017
open to premium members only
Business Email Compromise Scams Continue To Grow With $5.3B In Losses [63269]
eWeek, May 8th 2017

"The FBI revises its figures on the impact of business email compromise, revealing a significant spike in reported attacks during 2016.

Business email compromise (BEC) scams have resulted in $5.3 billion in financial losses since October 2013, according to new data released by the Federal Bureau of Investigation's Internet Crime Complaint Center (IC3), based on global reports.

BEC fraud, also known as email account compromise (EAC), is a type of scam where an attacker uses a phishing email to trick a company into paying fraudulent invoices and accounts payable requests.

The FBI has been warning the public about the dangers of BEC since at least January 2015, when it reported that the global impact of BEC attacks from Oct. 1, 2013, to Dec. 1, 2014, totaled $215 million. In June 2016, the FBI reported that the total value of BEC-related fraud losses had cumulatively grown to $3.1 billion..."
(Get More Information . .)

 
 1 2 3 4 5 6 7 8 9 10 11 next