Messaging security

You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted.

Articles
  • Secure E-Mail: Critical Business Applications May Be Wide Open to Attack
  • Defining your overarching goal for email phishing testing
  • Boost Exchange email security with the SANS Critical Security Controls
  • Top gotchas when performing email phishing tests
  • Minimize your online footprint to combat phishing
  • An easy way to help protect against email phishing
  • What to include in an Exchange phishing test
  • Some security considerations for hybrid Exchange deployments
  • Security survey shows Exchange as a sitting duck for attacks
  • Stop attackers from catching you in a phishing hack
  • How to adjust to the new Office 365 email retention policy
  • Get hands-on security experience in Exchange
  • Hosted Exchange security questions you should be asking
  • Security survey shows Exchange as sitting duck for attacks
  • Be the master of your messaging environment security
  • Take a layered security approach to Exchange
  • Recognize data breach causes in Exchange
  • Throw users a line to thwart an email phishing attack
  • Recognize data breach causes in Exchange
  • Take a proactive approach to mobile messaging security
  • Tackle email content filtering security lapses
  • Do your Exchange incident response plans hold up?
  • It’s time to reevaluate your email data retention policies
  • Set high expectations for secure Exchange Server and compliance
  • Choosing the best email security tools for your business
  • Do you need third-party email security tools?
  • Look for these security flaws in your messaging environment
  • How to write an effective data retention policy for Exchange
  • Solidify Your Exchange Server Incident Response Plan
  • Common Exchange Security Oversights
  • Nine Exchange Server risks you don’t want to overlook
  • Is full email encryption the solution to Exchange security?
  • Microsoft? Maybe. SMBs have e-mail options
  • How to (really) address HIPAA’s secure messaging requirements
  • Spam control to the rescue
  • Eight email administration blunders to avoid
  • Four ingredients for IM success
Podcasts
  • The Challenges and Solutions of Realtime Communications – Real-time communications like instant messaging are widely used throughout most enterprises today, but their use remains largely unmanaged. This puts organizations at risk for loss of intellectual property and crucial data, rising costs around e-discovery, fines for noncompliance, legal exposure from inappropriate use, and network vulnerabilities resulting from unauthorized access. Listen to this podcast to learn how to protect your organization from external attacks, prevent intentional or inadvertent leaks of sensitive data, and enable IT to demonstrate compliance concerning the use of real-time communications.
Webcasts
  • The Challenges and Solutions of Realtime Communications – Real-time communications like instant messaging are widely used throughout most enterprises today, but their use remains largely unmanaged. This puts organizations at risk for loss of intellectual property and crucial data, rising costs around e-discovery, fines for noncompliance, legal exposure from inappropriate use, and network vulnerabilities resulting from unauthorized access. Attend this webcast to learn how to protect your organization from external attacks, prevent intentional or inadvertent leaks of sensitive data, and enable IT to demonstrate compliance concerning the use of real-time communications.
  • Network analyzer tricks for monitoring and troubleshooting e-mail traffic – Do you think you have bandwidth, spam or security issues, but can’t find a way to quantify them for management? In this webcast, I outline how you use a network analyzer to look at e-mail traffic and find out what’s really going on.
  • Top Messaging Vulnerabilities: Implementing Technical Solutions – This webcast covers how admins can implement technical solutions that will help them fight messaging attacks and actually make them stick. I discuss the process issues that are often the root of all messaging security problems.
  • Top Messaging Security Vulnerabilities – Technical Issues – This webcast covers critical technical vulnerabilities within messaging systems that are often exploited by malware and malicious users. Topics such as e-mail protocol weaknesses, common e-mail and instant messaging software vulnerabilities, spam, storage issues, DoS attacks and malware are discussed. I also offer advice on the practical and realistic ways to deal with them.

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: