Editor's note
Love or hate email, employees can't function without it. For that reason alone, email is the perfect platform to deliver a constantly growing number of phishing attacks right into employees' inboxes. Security pros can spend days, months and years mitigating the breaches. But they spend even more time deploying the right tools and the right training to avoid the gut punch of living in reactive mode after a successful attack. Enter this guide-- an essential mix of articles looking at how email security risks can appear with one innocuous click of an email and how to cope with them. Check out how to better manage your email platform and benefit from some best practices our experts have gained through the years.
1Get a grip on email phishing attacks
If you want to serve up threats to your organization quickly and quietly, look no further than your organization's email platform. Yes, email security training happens, and refreshers may occur at regular intervals. But humans are human and the urge to click is so strong. At the same time, hackers are ever-more sophisticated. You need to know what tools and features are essential to deploy to get ahead of the email security risks that phishing attacks create.
-
Article
The top 3 email security threats and how to defuse them
Understanding the nature of the top 3 email security threats -- malware, phishing and spoofed domains -- can help reduce their impact. Read Now
-
Article
Nine email security features to help prevent phishing attacks
Check out nine email security features that can help protect you from phishing attacks. First, make sure they're enabled on your email system configuration, and if not, start your wish list. Read Now
-
Article
Create an email phishing test to minimize attack vectors
With email phishing testing, IT can improve its end-user security. Phishing attacks prey on user ignorance, so IT can use a test to teach users how to avoid this attack vector. Read Now
-
Article
How to create an internal phishing campaign from scratch
When IT begins an email phishing campaign, it must determine what server the emails will come from, consider phishing tool options and more. Read Now
-
Article
How are tech support scams using phishing emails?
Threat actors are using phishing email campaigns to fool users with tech support scams and fake Blue Screens of Death. Learn how these campaigns work with expert Nick Lewis. Read Now
2Nail down email security management
Hackers are always a step ahead of even the most vigilant security pros. Even with the latest email security protection strategies, email security management needs to constantly evolve and change. We used to rely on perimeter-based security but now that perimeter has vanished. Security managers can assess the security situation by running ethical phishing studies. But, more than ever, they need to create email security management plans that cover cloud-based email, public Wi-Fi connections, mobile and IoT devices, and include measures to protect data in transit.
-
Article
Top 5 email security issues to address in 2019
The top five email security issues come from a variety of places, from email phishing to account takeovers. Our security expert recommends being vigilant and poised to take action. Read Now
-
Article
Find out whether secure email really protects user data in transit
Outside of user perceptions, how safe is secure email in terms of protecting users' data in transit? Our expert explains how much the SSL and TLS protocols can protect email. Read Now
-
Article
Testing email security products: Challenges and methodologies
Kevin Tolly of the Tolly Group offers a look at how his company set out to test several email security products, as well as the challenges it faced to come up with sound methodologies. Read Now
-
Article
Testing email security products: Results and analysis
Kevin Tolly of the Tolly Group offers a look at how his company set out to test several email security products and the challenges it faced to come up with sound methodologies. Read Now
-
Article
The problems with cloud-based email security
Cloud-based email security can be challenging for enterprises to achieve. Learn what makes it a challenge and how to secure email in the cloud from expert Dave Shackleford. Read Now
3Email security best practices
Email security risks are always front and center in the minds of security pros because email platforms offer hackers a red-carpet entrance to corporate systems. Paying attention to tried-and-true best practices is essential, but user training (and more user training) must always be at the top of the list. Wait --there's more! And you’ll find it when you check out the technical advice in this section and implement the best practices that make sense for your organization.