Beveiliging

Waarom beveiliging vitaal is voor het kanaal

Email is in the frontline in the war on cybercrime. It is often the primary access point to the outside world and brimming with valuable data, so protecting it has never been more important.Organizations have traditionally looked to the IT channel to…

Meer informatie
Beveiliging

IP EXPO 2015: degenen die risico's inschatten, zullen de resultaten inblikken

Question: what’s happened between this year’s IP EXPO Europe and last year’s? Answer: the security arms race has gone into overdrive.Twelve months seems a short time, but in that period attacking techniques have matured markedly – now hackers are reg…

Meer informatie
Office-365, Email Security

Een interessante toevoeging: onze nieuwe sandbox voor e-mailbijlagen

We recently released a new Targeted Threat Protection service to help protect employees from weaponized email attachments – Attachment Protect. Malicious email attachments are a critical threat to businesses as they can easily bypass existing d…

Meer informatie
Productivity, Security, Awareness Training

Webinar: De menselijke firewall en e-mailbeveiliging verbeteren

When it comes to enterprises finding innovative ways to neutralize widespread email-based attacks, I’ve made the case before that it's employees – the same “weak links” who unknowingly click on malicious email URLs and attachm…

Meer informatie
Beveiliging

Voorkom 'ongeoorloofde fouten' door uw Spear-Phishing-technologie te upgraden.

In tennis, you never want to commit an unforced error. These are the worst kind of point-costing blunders a player can commit – the completely avoidable, self-inflicted ones that have nothing to do with the skill of the opponent or the excellence of …

Meer informatie
Beveiliging

Een beetje vertrouwen in mensheid = een belangrijk probleem voor e-mailbeveiliging, cyberaanvallen, e-mailaanvallen, spear phishing-aanvallen, malware, cloud-storingen, enz.

It was reported earlier this month that Russian hackers accessed President Barack Obama’s email system inside the White House. When asked to comment on the attack, Deputy National Security Advisor, Ben Rhodes, said: “We do not believe that our c…

Meer informatie
Productivity, Security

De menselijke firewall: waarom mensen het antwoord kunnen zijn

Half the problem with protecting your enterprise from every hacker, phisher, visher and botnet herder is the helpful part of human nature, that wants to be…helpful. We’ve known for a very long time that the vast majority of successful cyber-attacks r…

Meer informatie
Office-365

Het einde van de kluis: Waarom lokale e-mailarchieven tot het verleden behoren

Customers are increasingly trading in their old, bloated, expensive on-premises email archives for cloud services. Over time, these last-century technologies will take their place in the history of computing – the world, technology and the needs of c…

Meer informatie
Beveiliging

2015 staat voor de terugkeer van de imperatieve veiligheid

This time last year futurologists were predicting the gentle evolution of the Big Data trend. Few would have predicted how dramatic the resurgence of security has been.Sure, there was a drumbeat of public security breaches like Snowden in play, but t…

Meer informatie