Enterprise email and IM security journal

These days, everybody in the business world is connected to everybody else in some way, shape or form: that there are more opportunities for exposure to messaging threats.

These days, everybody in the business world is connected to everybody else in some way, shape or form. From a security standpoint, this means that there are more opportunities for exposure to messaging threats. With email, instant messaging and file sharing, a computer or even an entire network can be compromised in a matter of seconds. Use these resources from SearchWindowsSecurity.com to defend yourself against the many threats posed to a fully connected Windows network.


Spam. Everybody has it, nobody likes it. The Spam Learning Guide explains the basics of spam and offers techniques and tools to battle it. You'll find spam-related tutorials, tips, tools, white papers, expert advice and more that will help you combat unsolicited email in your Exchange Server environment.

In the wrong hands, IM and P2P file sharing can be too much of a risk for your organization. There are many ways to block this traffic, but some are more elegant -- with fewer adverse effects -- than others. Contributor Serdar Yegulalp details the process in this step-by-step guide.

This compilation of our favorite Exchange Server security best practices, tips and tools will improve your fundamental understanding of common email security threats -- viruses, spam and phishing -- and teach you how to prevent and troubleshoot them.

Microsoft's new Office 2003 Service Pack 2 adds functionality to Outlook 2003's Junk Email Filter to help protect against phishing scams. Find out how it works.

If you don't want to have your email messages read by just anyone, you should probably encrypt them. Brien Posey also explains when to use digital certificates and digital signing.

In this learning guide from the editors of SearchWindowsSecurity.com, you'll find a healthy collection of tips, expert Q & A's, webcasts, downloads and more that will ensure that you are properly prepared to handle all of your patch management issues.

This was last published in August 2006

Read more on Operating systems software

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close