The cybersecurity paradigm is built on being prepared for the unexpected. Organizations have long relied on strategies like employee training, security procedures and IT solutions help defend against cyber threats. Therefore, it’s imperative for organizations to rethink their security strategies with remote work and the current threat landscape firmly in mind. Paula’s talk at TEC, Hacker’s Paradise: Top 10 Biggest Threats when Working from Home, will provide a deep analysis of the top threats to pay attention to, along with practical recommendations for both technical teams and decision makers.
In the second and final part of this series, Tony outlines how to facilitate end-user reporting of suspicious emails.
How to use Exchange Online mail flow rules to improve the effectiveness of your EOP spam filtering and protect Office 365 users from phishing attacks.
Microsoft has improved the phishing and impersonation detection capabilities of Exchange Online Protection and Office 365 Advanced Threat Protection with anti-phishing policies.
The Epsilon data breach that compromised tens of millions of email addresses has been the big news of the email world lately. What are you telling your customers to expect?