Good practice, Part 7: Digital e-mail signatures
It is a good practice to sign e-mail. It is as simple as that. But it's good to know how digital signatures work so you understand why you should trust them....
It is a good practice to sign e-mail. It is as simple as that. But it's good to know how digital signatures work so you understand why you should trust them....
E-mail is perhaps one of the most important attack vectors for cyber criminals today. Companies have lost a lot of money due to e-mail compromise and fraud....
Most businesses send e-mail from individuals and systems to customers, suppliers, and partners. But are you sure these messages actually reach their recipients? What can you do to improve deliverability? This article will ...
In this article I will cover how to delegate admin rights to ICT staff throughout the business, so you enable them to do their job and at the same time mitigate the risk of having admin rights....
Users are able to install some software without admin rights, and malware take advantage of that. In this article I'll discuss how you should mitigate that problem....
If you set up a fresh copy of Windows, the default user account will have administrator rights. You should do something about that. But why, and what?...
You probably heard about the password policy "industry standard"; 8 characters minimum, complexity rules and expiration after 90 days. But is this good enough?...