Security

Why Security is a Vital Offering for the Channel

Email is in the frontline in the war on cybercrime. It is often the primary access point to the outside world and brimming with valuable data, so protecting it has never been more important.Organizations have traditionally looked to the IT channel to…

Read More
Security

IP EXPO 2015: Those Who Respect Risk Will Reap the Rewards

Question: what’s happened between this year’s IP EXPO Europe and last year’s? Answer: the security arms race has gone into overdrive.Twelve months seems a short time, but in that period attacking techniques have matured markedly – now hackers are reg…

Read More
Office-365, Email Security

Under the Hood: Our New Email Attachment Sandbox

We recently released a new Targeted Threat Protection service to help protect employees from weaponized email attachments – Attachment Protect. Malicious email attachments are a critical threat to businesses as they can easily bypass existing d…

Read More
Productivity, Security, Awareness Training

Three Ways to Improve the “Human Firewall” and Strengthen Email Security

When it comes to enterprises finding innovative ways to neutralize widespread email-based attacks, I’ve made the case before that it's employees – the same “weak links” who unknowingly click on malicious email URLs and attachm…

Read More
Security

Avoid 'Unforced Errors' by Upgrading Your Spear-Phishing Technology

In tennis, you never want to commit an unforced error. These are the worst kind of point-costing blunders a player can commit – the completely avoidable, self-inflicted ones that have nothing to do with the skill of the opponent or the excellence of …

Read More
Security

A Little Trust in Humans = A Major Email Security Issemail security, spear phishing, cyber attack, email attack, spear phishing attack, malware attack, threat protection, cloud outages ue

It was reported earlier this month that Russian hackers accessed President Barack Obama’s email system inside the White House. When asked to comment on the attack, Deputy National Security Advisor, Ben Rhodes, said: “We do not believe that our c…

Read More
Productivity, Security

The Human Firewall: Why the Humans Might Be the Answer

Half the problem with protecting your enterprise from every hacker, phisher, visher and botnet herder is the helpful part of human nature, that wants to be…helpful. We’ve known for a very long time that the vast majority of successful cyber-attacks r…

Read More
Office-365

The Vault Is Dead: Why On-Premises Email Is History

Customers are increasingly trading in their old, bloated, expensive on-premises email archives for cloud services. Over time, these last-century technologies will take their place in the history of computing – the world, technology and the needs of c…

Read More
Security

2015 Signals the Return of the Security Imperative

This time last year futurologists were predicting the gentle evolution of the Big Data trend. Few would have predicted how dramatic the resurgence of security has been.Sure, there was a drumbeat of public security breaches like Snowden in play, but t…

Read More