5 Things to Look For Before You Click – The Anatomy of a Phishing Email

At the most basic level, a phishing scam involves sending fraudulent emails that appear to be from a reputable person or company, with the goal of deceiving recipients into either clicking on a malicious link or downloading an infected attachment, usually to steal financial or confidential information.

Security Expert Discusses Cloud Based Email Filtering

Phillip Long, a Certified Information Security Systems Professional (CISSP), talks cloud based email filtering in his latest Defense-in-Depth series video. During the video, he gives best practices for email security. Check it out below! About the Speaker, Phillip Long Phillip Long is a Certified Information Security Systems Professional (CISSP) and author of Everything You Must […]

The Case for Employee Monitoring and Usage Policies

Employee monitoring is becoming more and more popular as businesses look into ways they can have tighter security and a more productive workforce. It’s true that the employee workplace has come a long way in terms of labor rights and fair wages, equal opportunity, and what questions are appropriate to ask in interviews. However, when it […]

New Legal Reasons Why All Businesses Need an Email Archiving System

The internet has caused businesses to change quite a bit over the past two decades. One of the major trends is business communication done via email. In fact, many business deals are made today without a face-to-face meeting or even a phone conversation. After a few emails are exchanged, the deal is closed. With so […]