Guardian Digital Blog - Page No: 8

We post our thoughts, insights, and leads here. Keep in touch by RSS feed, an email subscription, or just checking back here every so often. 

Email Account Compromise (EAC)

Is that email that just appeared in your inbox really from who it says it's from? How certain can you be?...

Comment
There’s a Lot to be Gained with Effective Email Security

Regardless of the size of your company or the industry that it services, you rely heavily on email for business - and can reap tremendous benefits by investing in your email security...

Comment
Top Email Security Trends Putting Your Business at Risk of Attack in 2021

Since the beginning the COVID-19 crisis, there has been a seismic shift in the way businesses operate. With a large portion of the global workforce now working remotely - a trend that will likely continue even after we emerge from this pandemic, email use for business communications is at an all-time high - and so is the email-borne risk that all businesses face...

Comment
Are Employees the Weakest Link in Your Email Security Strategy?

When determining your email risk and assessing your email security strategy, it is common for administrators and IT professionals to focus on the threat that outsiders pose to their organization. While this is a valid concern, the critical mistake that is made far too frequently is failure to address the role that employees play in many attacks and...

Comment
Open Source Email Security

LinuxSecurity.com editors have a seat with Dave Wreski, CEO of Guardian Digital, Inc. and respected author of various hardened security and Linux publications including the revolutionary Linux Security HOWTO, to talk about Guardian Digital’s unique open-source approach to securing business...

Comment
Social Engineering Attacks

In a previous blog post Think Like A Criminal: How To Write A Phishing Email, we examine phishing from the eyes of an attacker to help you understand and protect against this notorious email scam that is to blame for over 90% of all cyberattacks. In this article, we'll take a look at social engineering - or techniques that attackers employ to manipulate psychology. Considering 98% of all cyber attacks rely on social engineering, we want to provide you with information on the topic and advice...

Comment

Must Read Blog Posts

Latest Blog Articles

Recommended Reading