E-mail Security School Lesson 2: Threats and Mitigation Strategies

News

E-mail Security School Lesson 2: Threats and Mitigation Strategies

In lesson two of E-mail Security School, guest instructor Joel Snyder teaches proactive strategies for minimizing the threat of spam and viruses to enterprise networks. Building on the e-mail security essentials introduced in Lesson 1, learn how spam and viruses should be dealt with once they've made their way on to your networks, and issues in implementing end user controls and quarantines.

   Webcast: E-mail security: Taming the beast, part two -- Spam and virus mitigation strategies
   Technical paper: Oops! Exposing the biggest blunders for fighting spam and viruses
   Quiz: Can you slay spam and viruses?
   About the Instructor
   Lesson 2 Discussion Forum

MAIN MENU
E-mail Security School Home

Lesson 1: E-mail security essentials

Lesson 2: Threats and mitigation strategies

Lesson 3: E-mail policy control

Discussion Forum

  

Webcast: E-mail security: Taming the beast, part two -- Spam and virus mitigation strategies

Learn proactive strategies for minimizing the threat of spam and viruses to enterprise networks. This webcast is available on-demand. Participants who register with a valid e-mail address and attend all three course webcasts will receive a certificate of completion from SearchSecurity.com. In addition, through our agreement with (ISC)⊃2;, all CISSPs and SSCPs who attend this webcast can earn 1 CPE credit.

BEGIN THE WEBCAST

Find out how you can earn CPE credits

  

Technical paper: Oops! Exposing the biggest blunders for fighting spam and viruses

Learn about two common, yet misguided, practices for dealing with spam and viruses. Guest instructor Joel Snyder explains why these practices cause more harm than good and proposes best practices to use in their place.

READ THE TECHNICAL PAPER

  

Quiz: Can you slay spam and viruses?

Assess your knowledge of spam and virus mitigation strategies based on the teachings in part two of our E-mail Security School. In order to successfully pass the quiz, you have to complete Parts I and II of this lesson.

TAKE THE QUIZ

  

About the Instructor
@9711
Joel Snyder is a senior partner with Opus One, a consulting firm in Tucson, Ariz. He sent his first network e-mail in 1980, and has been designing and implementing enterprise e-mail systems ever since. He is partially to blame for the X.400 messaging standards and has been trying to atone for them ever since.





  
Security School Discussion Forum

Round out your Security School experience by interacting with our guest instructor Joel Snyder and your peers. The Security School Discussion Forum is an online community where you can find answers, share strategies and give advice.

Check out some of the latest postings:

The pros and cons of dropping attachments
Why isn't dropping certain attachments (pif, scr, etc.) a good practice? I think it's safe to say that most companies have no use for these files. I agree that dropping them is not the ONLY solution, but for many file types, it is a good practice. >>1 new reply

The value of using multiple AV engines
What is the value of using multiple antivirus engines on the SMTP or Exchange front ends? Is this a recommended practice rather than relying on a product with a single engine at the edge? >>1 new reply

Encrypting Outlook/Exchange e-mail
Does standard Outlook/Exchange e-mail going out over the Internet get encrypted, or do we need to do something to make that happen? Is the default S/MIME a type of encryption? >>1 new reply


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy