Content Security (Email & FTP)

Last Updated on 16 April 2008, Total: 9 Articles and Tutorials

  1. Data Leakage, preserving confidentiality

    Article focusing on data leakage and how this information asset is lost and the result of exposure. This vulnerability may be the result of inadequate measures, or poorly implemented controls that expose organizations and their clients... Read More

  2. Phishing Metamorphosis in 2007 - Trend and Developments

    An account of various trends and developments that phishers embraced during 2007, and what are the driving factors behind the huge percentage increases in phishing emails during the year... Read More

  3. Popular Spammers Strategies and Tactics

    An assessement of several different recent spam campaigns, demonstrating the key concepts spammers use, and providing concise strategic advice on how to undermine their current model... Read More

  4. Managed E-Mail Security Services: Is it the right solution for your network?

    Email communications are essential to getting the job done in today’s business world, but many companies are overwhelmed by spam, the security risks of e-mail borne viruses and worms and liability implications of e-mail containing pornography or other undesirable content. It’s getting harder and harder for network administrators to keep it all under control... Read More

  5. How to Avoid Phishing Scams

    If you received an E-mail message from your bank saying that your checking account was overdrawn because of a check that you didn’t write, what would you do? Before you answer, it’s important to realize that you may not really be overdrawn and that there is a good chance that someone is trying to scam you. In this article, I... Read More

  6. Is it Time to Start Encrypting Your E-mail?

    Longing for a little privacy? Thinking it might be time to start encrypting your e-mail? This article looks at the pros and cons, examines e-mail encryption technologies, and provides some tips for getting the most out of e-mail encryption... Read More

  7. Understanding E-mail Spoofing

    Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from... Read More

  8. E-mail spam: Is it a Security Issue?

    The daily deluge of unsolicited commercial or offensive messages (more commonly known as spam) comprises one of the biggest problems facing network administrators and users today. In this article, we will examine how spam presents a security threat to your network, and we’ll discuss the most effective way to deal with it: a multi-layered or “defense in depth” approach that... Read More

  9. Protecting your Email from Viruses and Other MalWare

    Virus writers, who used to spread their virtual “diseases” via infected floppies and network shares, have seized the opportunity posed by email programs that support attached files, HTML messages, and embedded scripts to send viruses and other malicious software (called “malware”) to hundreds or thousands of people with just a few keystrokes. In this article, we will look at how... Read More

Featured Links