email security

  • Security Manager's Journal: Move to hosted email opens new vulnerabilities

    Posted October 7, 2013 - 2:32 pm

    I took somebody's word for something, and I didn't subsequently check it out to my own satisfaction. Result: big trouble. Lesson: always verify.
  • Security Manager's Journal: Auto-forwarded emails could be a huge problem

    Posted July 8, 2013 - 3:29 pm

    Our intellectual property and sensitive data have been leaving the relatively safe confines of our internal network without adequate security precautions, all because users find it convenient to get their company email in their personal webmail accounts.
  • How joining Google Gmail with encryption system helps high-tech firm meet government security rules

    Posted February 8, 2013 - 8:48 am

    When a relatively small high-tech company with some big aerospace and defense customers wanted to adopt cloud-based email for its employees, it faced the challenge that whatever choice of cloud service it adopted, it had to meet the government's security regulations known as ITAR, or the "International Traffic in Arms Regulations."
  • Here's how to secure your email and avoid becoming a 'Petraeus'

    Posted November 19, 2012 - 4:23 pm

    Take a look at where Petraeus and Broadwell went wrong so you can better secure your email and protect your privacy online.
  • Microsoft will pay $250K for a botnet (er...the controllers of one -- Rustock)

    Posted July 18, 2011 - 3:18 pm

    In the software business, if you can't find a way to build or learn something -- or catch someone -- is to offer money. $250k for arrest of Ruststockers.Go Get 'em, everyone but Microsoft!
  • Good news: Appliance fights spear-phishing. Bad news: You can't afford it

    Posted June 6, 2011 - 6:00 am

    Security services company Cyveillance is building its global threat database into an appliance that will filter your mail, test bad links and monitor high-risk employees. For a very steep price.
  • After 40 years, email security still elusive, experts say

    Posted April 29, 2011 - 11:34 am

    According to the survey, conducted by secure messaging provider VaporSteam Inc., nearly three-fourths of respondents from large companies say they've violated compliance rules via email.
  • Epsilon e-mail hack: What you need to know

    Posted April 4, 2011 - 4:54 pm

    Names and e-mail addresses fell into the wrong hands last week, when Epsilon suffered a data breach affecting at least 19 of its client companies. It may sound scary, but don't panic. Here's what you need to know about the Epsilon e-mail hack.
  • Top secret! Keep your e-mail private and secure

    Posted December 1, 2010 - 11:41 am

    Your e-mail message could be intercepted midstream, and you might never realize it. Copies and remnants of your message stored on your PC could be compromised as well. You have to take steps to secure and protect your e-mail messages.
  • Enterprise security on a small business budget

    Posted March 8, 2010 - 5:30 pm

    Whether your business is a big fish or a small-fry home office, you can get hacked just the same, and the stakes are higher than a few canceled credit cards. Here are a few tips to protect your users and your networks--steps that even enterprise-class security specialists may slip up on.
  • Video

    The State of Security: The Trouble with PCI

    Posted December 18, 2009 - 9:58 am

    SecureState President and CEO, Ken Stasiak, gives tips on email security, discusses PCI Compliance enforcement, SOX Compliance, the recent breach at NASA, and the missing "Cyber Czar."
  • Who is reading your email, besides you?

    Posted October 29, 2009 - 2:20 pm

    Do you think sending e-mails and documents over the Internet is secure? Are you tempted to send your credit card number, social security number or other personal or sensitive information over e-mail just because it's convenient? Keep in mind that you and the authorized recipient or recipients may not be the only ones who read your e-mails.
  • Improving email security in Windows 7

    Posted January 29, 2009 - 5:38 am

    The first reviews are starting to come in about Windows 7, and email admins may be wondering, "Is my email going to be more secure?" The answer is, as always, "it depends".
  • SOHO businesses beware of 419 scam

    Posted January 27, 2009 - 11:01 am

    Spam comes in all shapes and sizes. Besides the traditional email spam, spammers target forums, blogs, and now, for the first time I’ve seen them targeting Web 2.0 B2B sites with a variation of the old Nigerian 419 scam, this one involving advanced fee fraud. Small businesses and one-man shops should take note and beware of this activity.
  • False Positive Email Alerts

    Posted January 9, 2009 - 5:12 am

    If you’re like most people, then you’re already using anti-virus software and have implemented anti-spam controls so that unwanted email does not reach your inbox. Occasionally I look at my “spam” folder and am surprised to see emails in there that I would ordinarily read. Some are even emails that I must read.
  • Patch those computers, the boogeyman is coming!

    Posted December 11, 2008 - 10:54 am

    Security companies like to make shocking claims so that we will be convinced to use their products. And while part of that is just marketing, the fact is, we do need to be shocked out of our complacency every now and then. We need to be told that the boogeyman is out there and he’s going to get our computer one day.
  • How well do you know your spam?

    Posted December 11, 2008 - 10:43 am

    Here are some tidbits to share as ongoing education for your email user community.
  • How to decode Spam Headers

    Posted December 4, 2008 - 11:42 am

    Spammers know that they can be tracked through the “Received:” lines in the headers. Therefore, they often attempt to obfuscate the headers to confuse matters. Although “Received:” headers can also be forged, it is somewhat more difficult than simply forging the return address.
  • Don’t Pass It On!

    Posted December 4, 2008 - 11:39 am

    Around the holiday, I always see more chain emails coming through from well-intended friends and relatives, and so it’s time for an annual warning. Some of these chain emails just have interesting pictures, some make outrageous claims. A large majority of the latter are hoaxes.
  • Sued Over Deceptive Emails

    Posted November 14, 2008 - 5:47 am

    Ars Technica is reporting that a customer of, a people finding and social networking service, is suing them for sending deceptive emails that trick people into signing up for their paid service. Read the rest of this entry>>

  • The flipside of spam protection: Keeping your business out of blacklists

    Posted November 13, 2008 - 5:43 am

    We do pay a lot of attention to filtering out spam, and rightly so. The vast majority of all email traffic is spam, and while some of it is merely annoying, some also contains dangerous malware in the form of attachments, or links to malicious web sites. It drains bandwidth and saps productivity.
  • How to Protect Your Private Key

    Posted November 13, 2008 - 5:37 am

    In the world of Certificate Authorities and digital signatures there still exist questions about who gave the authority to the CA’s to authorize the certificates? And although a certificate has been granted, how should we treat a private key that is suspected as having not come from the authorized owner?
  • What are the considerations of installing Email Security Software?

    Posted November 13, 2008 - 5:36 am

    After migrating to Exchange, a team member and I asked ourselves about the strategized about the next piece of this puzzle. Should we install email security software on the Exchange Server or a separate server?
  • Protecting your network against email threats

    Posted November 11, 2008 - 4:58 am

    The widespread use of email has provided hackers and crackers with an easy way to distribute harmful content to the internal network. Hackers can easily circumvent the protection offered by a firewall by tunneling through the email protocol, since it does not analyze email content.
  • A solution to email-based bank phishing attacks

    Posted November 10, 2008 - 12:01 pm

    A research note from TowerGroup, sponsored by IBM, addresses the issue of security in online banking, and the techniques that cybercriminals are using to gain access to online bank accounts. Although the report, published in 2005, is a bit outdated, its message still hits home.
Join us:






Join today!

See more content
Ask a Question