

Did you know that approximately 300 billion emails are sent every day and that about half of all email traffic is considered spam? Sending your customers information that they don’t want or can’t use isn’t the way to build a meaningful relationship. Customers won’t waste their time with companies...
Published: Feb 08, 2022


Did you know that approximately 300 billion emails are sent every day and that about half of all email traffic is considered spam? Sending your customers information that they don’t want or can’t use isn’t the way to build a meaningful relationship. Customers won’t waste their time with companies...
Published: Feb 08, 2022


Download this white paper to see how the customer can utilize PST Enterprise to centralize email for their new end user base without interruption to the end users themselves.


For many companies, data loss prevention (DLP) has, for too long, emphasised the management of internal data, blocking sensitive information from leaving company networks. But this is not a real world solution when email continues to be the main channel over which employees distribute and share what is often confidential...


Behind almost every cyber attack is someone who fell victim to it. In each case, someone has clicked the wrong link, opened the wrong file or trusted the wrong email. In the 2021 Verizon Data Breach Investigations Report1, 85% of breaches involved human error.
Despite constantly changing tactics, evolving malware...
Published: Dec 21, 2021


This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans.
The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.


Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi-layered defences. Cyber attackers have countless ways of tricking your users, preying on their trust and exploiting their access to key data, systems and resources.
To succeed, attackers need to...
Published: Dec 21, 2021


In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...
Published: Dec 21, 2021


The attacks can and do hit organizations of all sizes and are only becoming more widespread and difficult to detect. The consumerization of IT and Bring Your Own Device (BYOD) only exacerbates the issue since companies now have many more endpoints to protect—many of which they don’t own.
In a survey of...


Whether we’ve realized it or not, everyone with an email account has received a transactional email, otherwise known as the alert that Bob accepted your friend request, the receipt for the days-of-the-week socks you just bought online, or even a welcome email for signing up for that new deal of the day website.
...


More than 90% of cyberattacks start with email. But as organisations continue to shift their systems to the cloud, cyber criminals are shifting their tactics by blending both email and cloud attacks to take advantage.
This means your perimeter-based defences are no longer effective. Attackers know the easiest way...
Published: Sep 16, 2021


j2 Global provides industry leading Internet Fax Messaging solutions for global enterprises looking to streamline the exchange of business critical information and eliminate the costly infrastructure of in-house fax machines and servers. Learn more about eFax in this informative overview that will cover the benefits of...


OpenText Secure Mail is a cloud-based secure messaging solution for encrypting, tracking, and preventing the leak and interception of confidential information.


Email fraud costs companies around the world billions and can destroy brand reputation and consumer trust in minutes.
The DMARC (Domain-based Message Authentication Reporting & Conformance) standard is the most powerful weapon to date in the fight against phishing and email spoofing.
This Getting Started...
Published: Dec 21, 2021