Three Marching Steps Towards Complete SOX ComplianceThree Marching Steps Towards Complete SOX Compliance

February 6, 2019

Compliance is without a shadow of a doubt a cornerstone of every modern business model. So many enterprises are falling short in their aspirations to “touch the sky” after failing to play by the government-established rules.

GDPR Email Compliance: A Necessity of Modern Business LifeGDPR Email Compliance: A Necessity of Modern Business Life

February 4, 2019

Games that have too many rules usually don’t stick with people, but the business game is an exception. One could say that it has a pile of regulations and absolutely no mercy – and would be right.

Phishing Attacks Prevention: How To Protect Your Enterprise Against Phishing AttacksPhishing Attacks Prevention: How To Protect Your Enterprise Against Phishing Attacks

January 30, 2019

As email continues to be the most common vector of all social cyber-attacks (96%), phishing has become increasingly common. According to a recent Verizon report, phishing and pretexting actually represent 98% of social incidents and 93% of breaches.

How Not to Get on the Phishing Hook of the Internet FraudstersHow Not to Get on the Phishing Hook of the Internet Fraudsters

January 24, 2019

How often do you follow the wise advice from the “Measure Twice, Cut Once” proverb? And this one: “Trust, but Verify”? After the incident that happened to me, I could say I did become wiser.

How to Recall an Email in Outlook With StealthMailHow to Recall an Email in Outlook With StealthMail

January 22, 2019

I recently wrote a message, attached an annual financial report to it and clicked Send. One second later, a genius idea crossed my mind – to check the report for orthographic mistakes. All I could think afterward was: “What was I thinking when I clicked…

Email Vulnerabilities: Why Most Of Existing Email Security Solutions Are Not Good EnoughEmail Vulnerabilities: Why Most Of Existing Email Security Solutions Are Not Good Enough

January 17, 2019

Did you know that the current email protocol dates back to the 1980s and has yet to be properly overhauled? In fact, usage of a regular email potentially violates dozens of EU GDPR articles, which may lead up to €20 million in fines. Yes, it is that bad.

The Fall of 2FA: New Form of Phishing EmergesThe Fall of 2FA: New Form of Phishing Emerges

January 14, 2019

The dreaded day has come. The two-factor authentication is no longer a reliable safety mechanism for your account credentials.

This Email Security Solution Can Help Protect Your Business While Others Are Getting HackedThis Email Security Solution Can Help Protect Your Business While Others Are Getting Hacked

December 25, 2018

You know what they say: If it ain’t broke, don’t fix it. This may apply to your grandma’s old TV sitting in the corner of the room in her summer home in Florida, but it is the complete opposite of how cyber security works. You see, the vast majority of…

StealthMail CEO Offers To Donate $26 Million Worth Of Licenses To Help Ensure Protection Of EU Communications Network After Recent Cables LeakStealthMail CEO Offers To Donate $26 Million Worth Of Licenses To Help Ensure Protection Of EU Communications Network After Recent Cables Leak

December 21, 2018

European Union’s communications network, known as COREU, has been compromised revealing sensitive cables and shedding light on its cybersecurity vulnerabilities exploited by attackers. The trove of disclosed cables exposed data labeled limited and…

Info

We use cookies to improve your experience