5 Things to Look For Before You Click – The Anatomy of a Phishing Email

5 Things to Look For Before You Click – The Anatomy of a Phishing Email

At the most basic level, a phishing scam involves sending fraudulent emails that appear to be from a reputable person or company, with the goal of deceiving recipients into either clicking on a malicious link or downloading an infected attachment, usually to steal financial or confidential information.

Security Expert Discusses Cloud Based Email Filtering

Phillip Long, a Certified Information Security Systems Professional (CISSP), talks cloud based email filtering in his latest Defense-in-Depth series video. During the video, he gives best practices for email security. Check it out below!

About the Speaker, Phillip Long

Phillip Long is a Certified Information Security Systems Professional (CISSP) and author of Everything You Must Know About Choosing an IT Company, But Your IT Guy Will Never Tell You.

The Case for Employee Monitoring and Usage Policies

The Case for Employee Monitoring and Usage Policies

Employee monitoring is becoming more and more popular as businesses look into ways they can have tighter security and a more productive workforce.
It's true that the employee workplace has come a long way in terms of labor rights and fair wages, equal opportunity, and what questions are appropriate to ask in interviews.

New Legal Reasons Why All Businesses Need an Email Archiving System

New Legal Reasons Why All Businesses Need an Email Archiving System

The internet has caused businesses to change quite a bit over the past two decades. One of the major trends is business communication done via email. In fact, many business deals are made today without a face-to-face meeting or even a phone conversation.