Rethinking Email Security: Best Practices to Protect and Maintain Private Communications

2014 has been called “The Year of Encryption.”  The recent data breaches, personal identity theft cases, and email snooping concerns have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise.  Email is invaluable to enterprises.  It’s the easiest mode of communication which also makes it an easy target for data theft.Best practices for securing sensitive email communications.When is the right time to replace your legacy email security.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Vectra and Microsoft — A Powerful Combination for Integrated Cybersecurity

One of the biggest challenges security teams are faced with is doing more with less in conjunction with protecting the growing list of attack surfaces from being breached.
Watch Now

How To Create a Successful Cyber-Security Policy

DP Solutions

As security breaches become the new normal, having a cyber-security policy in place for your organization becomes essential. Technology alone cannot prevent a cyber-attack; therefore, businesses need to create a culture of security among their staff. The best way to do this is with cyber-security policies: a series of rules that define what end users may or may not do with their technology. In this on-demand webinar, DP Solutions’ Senior IT Risk Advisor Ben Schmerler discusses how to develop a solid and reasonable policy for your organization. From this webinar, you will learn: What information should be covered in your policies. Special considerations such as mobile devices, social media, compliance or legal concerns. How to properly document your policies. How to determine if your employees are following the policies. Technology options to enforce the policies.
Watch Now

Web Application Security Essentials

We know it’s a challenge to stay on top of your web application security with new vulnerabilities being introduced all the time by untrained developers. So what can be done? The most efficient way to reduce the attack surface is to educate your entire team on recognizing potential web security issues to avoid introducing vulnerabilities in the first place.
Watch Now

Prioritizing Active Directory Security to Disrupt Ransomware Attack

Attackers are targeting Active Directory in nearly every type of attack, especially ransomware attacks. Unfortunately, organizations struggle with where to begin to secure AD, as well as what should be emphasized. The end result is a weak AD security posture that is easily attacked and exploited by attackers. There is a solution to securing AD to disrupt attackers. By prioritizing the most exploited settings, the attack surface of AD can be dramatically reduced. This approach of securing AD gives every organization a clear starting and ending point to get through a first wave of securing their AD environment.
Watch Now