Depending on where you’re at with your Exchange “maturity model”, here are a few pieces I’ve written for SearchExchange.com about Microsoft Exchange security oversights, policies and plans to help you along the way:
How to write an effective data retention policy for Exchange
Solidify Your Exchange Server Incident Response Plan
Common Exchange Security Oversights
As always, be sure to check out www.principlelogic.com/resources.html for links to my additional information security articles, whitepapers, podcasts, webcasts, books and more.
“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.
His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”