Category: Email

DMARC

Universities: rich in knowledge, ripe for cyberattacks

Clare Holmes

As with any type of organisation, universities need to ensure they’re protecting critical data and systems. One easy to ignore point of entry is email - most IT teams will reassure you that they have the latest and greatest email gateway protection, but what many IT professionals with decades’ experience under their belts fail…

Read more
DMARC

Deciphering DMARC, DKIM and SPF

Clare Holmes

2018 saw a 250% year on year increase in DMARC policies published, so whatever it is, it’s seeing traction in the market. So let’s explain each acronym and see if we can’t make it simple. ...Continue Reading: Deciphering DMARC, DKIM and SPF

Read more
DMARC

Incoming and outgoing email: you just need to secure it all

Clare Holmes

How can you assure recipients that the emails that are sent from @yourdomain.com are actually from you and not from an opportunistic scammer impersonating your currently reputable brand?...Continue Reading: Incoming and outgoing email: you just need to secure it all

Read more
Cybersecurity

Holiday scams and how to beat them

Red Sift

With more people booking holidays online than ever the travel sector is awash with scams. Let's take a look at the most common ones and how to avoid them...Continue Reading: Holiday scams and how to beat them

Read more
DMARC

Infosecurity Europe 2019: A-listers still failing to protect their domains

Red Sift

In 2018, only 9% of those vendors claiming to solve your cybersecurity woes and offering the best of class protection on the market, had protected their own domains with DMARC at a level sufficient to stop phishing attacks at the gateway or sweep to the spam folder...Continue Reading: Infosecurity Europe 2019: A-listers still failing…

Read more
Cybersecurity

How do challenger banks compare on cybersecurity

Red Sift

The traditional banking sector has struggled to keep pace with the changing cyber threat landscape, in large part due to its ongoing reliance upon vast, sprawling and often archaic global IT systems...Continue Reading: How do challenger banks compare on cybersecurity

Read more