Read all of our news, articles, reviews, and more in our company blog
The full interview with Paul Jakobsen, North American Channel Manager at Proofpoint an enterprise email security focused cybersecurity solutions provider. The interview is around the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.
Email is the lifeline that connects remote workers to their organizations, especially a growing number of teams work from home or collaborate across the globe. But increasing an organization’s digital presence brings with it a growing number of digital threats. Crashes in cloud-based email platforms can slash productivity and create complications. Meanwhile, sophisticated cyber-attacks can compromise not just the security of employees, but also their data and the applications they use to do their jobs.
By Nick Sandin, Security Analyst and contributing author Brandon Doty, SOC Manager Dealing with credential harvesters has its perks. Day in and day out I get to personally observe how sophisticated a phishing website can be. Some websites are so elaborate that only a trained analyst can identify them, while others are so obvious no one in their right mind would fall for it. Either way, if it looks suspicious just follow the “POST”.
Proofpoint is a cybersecurity platform aimed to protect workers and data from advanced cybersecurity criminals that target email, social media and mobile devices.
Mimecast is a cloud-based, anti-spam, and archive filtering service for securing email accounts and communications for businesses.
Learn some of the basic considerations when establishing a strong password policy for your organization. Find out some of the best practices and industry standards when it comes to user access and a password policy framework. Most places of business require that their employees access their facilities by using a key or key card. In many ways, passwords are the keys by which employees access their workplace network. With physical office keys or card readers, proper policies and procedures must be implemented to ensure that unauthorized access does not occur. The same holds true with successful password policies for organizations.