SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
IT Manager’s Eyes Only
october 2015
TOP SEC
Multiple Intelligence reports have
identified significant, sinister threats
to global email communication networks
from coordinated underworld cyber
criminals. The threat is real and
substantial. Immediate action is
recommended to avoid catastrophe.
TOP SEC
Email remains the most common and
prevalent form of communication
in the business world.
RADICATI.COM
The total number of worldwide email
users, including both business and
consumers, is projected to go from
over 2.5 billion in 2014 to over 2.8
billion in 2018.
RADICATI.COM
Business users send and receive on average
121 emails a day in 2014 (projected to be 140
emails a day by 2018)
In 2014, the majority of email traffic came from
the business world, which accounts for over 108.7
billion emails sent and received per day.
By 2018, business email will account for over 139.4
billion emails sent and received per day.
By the end of 2018, worldwide mobile email users are
expected to total over 2.2 billion.
RADICATI.COM
The rapid expansion of email as the
single biggest primary
business communication channel has
fuelled a counter culture in
security threats and data breaches.
Spam, malware, ransomware and
phishing are all rising.
Think about your own company when you
view the following slides…
of employees access personal email from their business
computer, more than double the level of authorised use.
PINECOMPUTERS.NET
The average cost of a
data breach for large
enterprises is $429,000,
and 88% of companies have
experienced some degree
of data loss.
of employees receive
unencrypted, risky
corporate data via
email or attachment.
People send and receive
an average of 15 email
attachments every day
(over 5,000 attachments
per year).
THEAMERICANGENIUS.COM
SYMANTEC.COM
Cyber criminals targeted 5 out of 6 large companies
using email attacks in 2014 (an increase of 40%).
SME businesses also saw an uptick, with attacks
increasing 26% and 30% respectively.
unsolicited messages contain a
malicious attachment or link.
WWW2.TRUSTWAVE.COM
28% of breaches result from poor passwords, and
another 28% from weak remote access security.
WWW2.TRUSTWAVE.COM
39% of passwords are eight characters, a length
that takes an average of one day to crack.
(Compare that to 10-character passwords, which
take an average of 591 days.)WWW2.TRUSTWAVE.COM
increase in total cost
over 2013 levels.
In 2014, the average
cost of an enterprise
data breach reached
$3.79 million, a
WWW-01.IBM.COM
www.symantec.com
An increase of 317 million new
pieces of malware were created.
There are over 1.7 billion pieces
of malware currently in circulation
that could infect your inbox.
Non-targeted attacks of malware
increased by 26% in 2014.
WWW.SYMANTEC.COM
WW.SYMANTEC.COMWWW.SYMANTEC.COM
YOU CANNOT DEPEND ON VIRTUAL SANDBOXING
TO OBSERVE AND DETECT MALWARE.
Certain malware like W32.Crisis, upon detecting
a virtual machine, will search for other
virtual machine images and infect them.
In 2014, up to 28% of all malware
was ‘virtual machine aware’.
WWW.SYMANTEC.COM
There was a 4,000% increase in crypto-ransomware attacks.
Ransomware attacks grew 113% in 2014.
WWW.SYMANTEC.COM
WWW.SYMANTEC.COM
In 2013, crypto-ransomware
accounted for approximately
0.2 percent of all ransomware
attacks. By the end of 2014
this figure grgew to 4 percent
WWW.SYMANTEC.COM
GETCYBERSAFE.GC.CA
PHISHING ATTACKS COST GLOBAL ORGANISATIONS
$4.5 BILLION IN LOSSES IN 2014.
EMC.COM
from 2010 to 2014.
Phishing attacks rose by
EMC.COM
of people globally can’t correctly
identify a sophisticated phishing email.
securityaffairs.co
phishing.org
Spear phishing file type
breakdown analysis 2014
WWW.SYMANTEC.COM
Risk ratio of spear
phishing attacks by
industry
The mining industry
was the most heavily
targeted in 2014, with
43 percent (1 in 2.3)
of mining organizations
being targeted at least
once during the year.
WWW.SYMANTEC.COM
WWW.SYMANTEC.COM
Individuals in sales/
marketing job roles
were the most targeted
in 2014, with 1 in 2.9
of them being targeted
at least once; this
is equivalent to 35%
of sales/marketing
personnel
Cybercriminals rely on an underground
online economy to buy and sell
services and malware and to fence stolen
credit cards and botnets.
CYBERCRIME HAS A 1,425%
RETURN ON INVESTMENT.
WWW.SYMANTEC.COM
45% of businesses have board or senior level
management who take only a partial role in security
matters. 9% do not partake at all.
IN MANY CASES, THE IT MANAGER MUST TAKE FULL
RESPONSIBILITY ON THEIR OWN.
trustwave.com
In 2013, 4 out of 5 IT professionals were pressured
to rollout IT projects despite security issues.
forbes.com
of decision makers are facing
pressure to release IT projects that
are not security ready.
TRUSTWAVE.COM
Defend against email threats.
Deploy an email security service,
with multiple safeguards including
anti-spam, anti-malware and content
filtering capabilities.
Secure email traffic content.
Block or flag all executable files
and all suspicious orunusual file
attachments, such as .cpl, .chm and
.lnk files. Create alternative
methods for file sharing.
Ensure email security service
can handle blended threats that
combine spam with links to
malicious websites.
Educate users, from the bottom ranks
all the way up to the C-suite, on
the nature of today’s email attacks
and conduct mock phishing exercises.
Consider upgrading your IT
email defences with Blockmail.
1.
2.
3.
4.
5.
Unit 1, Block C, The Exchange
Calmount Park, Ballymount, Dublin 12, Ireland
Telephone: +353 (0)1 466 0686
Fax: + 353 (0)1 466 0687
Topsec Technology UK
Castle Hill House
12 Castle Hill, Windsor, SL4 1PD, United Kingdom
Telephone: + 44 (1784)725903
Topsec Technology Canada
Suite 830, 5991 Spring Garden Road
Halifax, B3H 1Y6, Nova Scotia
Telephone: + 1 902 430 9340
Email:
For sales enquiries: sales@topsectechnology.com
For support enquiries: support@topsectechnology.com
For DNS enquiries: dns@topsectechnology.com
DISCOVER MORE ABOUT HOW TO
COMBAT MALWARE AND SPAM WITH
OUR FREE EBOOK DOWNLOAD.
START YOUR FREE TRIAL TODAY
produced by
DOWNLOAD HERE

Contenu connexe

Tendances

Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
Patty Ramsey
 

Tendances (20)

Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Email threats
Email threatsEmail threats
Email threats
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Concepts
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Knowbe4 presentation
Knowbe4 presentationKnowbe4 presentation
Knowbe4 presentation
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 

Similaire à Email Security Threats: IT Manager's Eyes Only

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 

Similaire à Email Security Threats: IT Manager's Eyes Only (20)

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Data security
 Data security  Data security
Data security
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
W verb68
W verb68W verb68
W verb68
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Email Security Threats: IT Manager's Eyes Only

  • 1. IT Manager’s Eyes Only october 2015 TOP SEC
  • 2. Multiple Intelligence reports have identified significant, sinister threats to global email communication networks from coordinated underworld cyber criminals. The threat is real and substantial. Immediate action is recommended to avoid catastrophe. TOP SEC
  • 3. Email remains the most common and prevalent form of communication in the business world. RADICATI.COM
  • 4. The total number of worldwide email users, including both business and consumers, is projected to go from over 2.5 billion in 2014 to over 2.8 billion in 2018. RADICATI.COM
  • 5. Business users send and receive on average 121 emails a day in 2014 (projected to be 140 emails a day by 2018) In 2014, the majority of email traffic came from the business world, which accounts for over 108.7 billion emails sent and received per day. By 2018, business email will account for over 139.4 billion emails sent and received per day. By the end of 2018, worldwide mobile email users are expected to total over 2.2 billion. RADICATI.COM
  • 6. The rapid expansion of email as the single biggest primary business communication channel has fuelled a counter culture in security threats and data breaches.
  • 7. Spam, malware, ransomware and phishing are all rising.
  • 8. Think about your own company when you view the following slides…
  • 9. of employees access personal email from their business computer, more than double the level of authorised use. PINECOMPUTERS.NET
  • 10. The average cost of a data breach for large enterprises is $429,000, and 88% of companies have experienced some degree of data loss. of employees receive unencrypted, risky corporate data via email or attachment. People send and receive an average of 15 email attachments every day (over 5,000 attachments per year). THEAMERICANGENIUS.COM
  • 11. SYMANTEC.COM Cyber criminals targeted 5 out of 6 large companies using email attacks in 2014 (an increase of 40%). SME businesses also saw an uptick, with attacks increasing 26% and 30% respectively.
  • 12. unsolicited messages contain a malicious attachment or link. WWW2.TRUSTWAVE.COM
  • 13. 28% of breaches result from poor passwords, and another 28% from weak remote access security. WWW2.TRUSTWAVE.COM
  • 14. 39% of passwords are eight characters, a length that takes an average of one day to crack. (Compare that to 10-character passwords, which take an average of 591 days.)WWW2.TRUSTWAVE.COM
  • 15. increase in total cost over 2013 levels. In 2014, the average cost of an enterprise data breach reached $3.79 million, a WWW-01.IBM.COM
  • 17.
  • 18. An increase of 317 million new pieces of malware were created. There are over 1.7 billion pieces of malware currently in circulation that could infect your inbox. Non-targeted attacks of malware increased by 26% in 2014. WWW.SYMANTEC.COM
  • 20. YOU CANNOT DEPEND ON VIRTUAL SANDBOXING TO OBSERVE AND DETECT MALWARE. Certain malware like W32.Crisis, upon detecting a virtual machine, will search for other virtual machine images and infect them. In 2014, up to 28% of all malware was ‘virtual machine aware’. WWW.SYMANTEC.COM
  • 21.
  • 22. There was a 4,000% increase in crypto-ransomware attacks. Ransomware attacks grew 113% in 2014. WWW.SYMANTEC.COM
  • 24. In 2013, crypto-ransomware accounted for approximately 0.2 percent of all ransomware attacks. By the end of 2014 this figure grgew to 4 percent WWW.SYMANTEC.COM
  • 25.
  • 27. PHISHING ATTACKS COST GLOBAL ORGANISATIONS $4.5 BILLION IN LOSSES IN 2014. EMC.COM
  • 28. from 2010 to 2014. Phishing attacks rose by EMC.COM
  • 29. of people globally can’t correctly identify a sophisticated phishing email. securityaffairs.co
  • 31.
  • 32. Spear phishing file type breakdown analysis 2014 WWW.SYMANTEC.COM
  • 33. Risk ratio of spear phishing attacks by industry The mining industry was the most heavily targeted in 2014, with 43 percent (1 in 2.3) of mining organizations being targeted at least once during the year. WWW.SYMANTEC.COM
  • 34. WWW.SYMANTEC.COM Individuals in sales/ marketing job roles were the most targeted in 2014, with 1 in 2.9 of them being targeted at least once; this is equivalent to 35% of sales/marketing personnel
  • 35. Cybercriminals rely on an underground online economy to buy and sell services and malware and to fence stolen credit cards and botnets. CYBERCRIME HAS A 1,425% RETURN ON INVESTMENT.
  • 37.
  • 38. 45% of businesses have board or senior level management who take only a partial role in security matters. 9% do not partake at all. IN MANY CASES, THE IT MANAGER MUST TAKE FULL RESPONSIBILITY ON THEIR OWN. trustwave.com
  • 39. In 2013, 4 out of 5 IT professionals were pressured to rollout IT projects despite security issues. forbes.com
  • 40. of decision makers are facing pressure to release IT projects that are not security ready. TRUSTWAVE.COM
  • 41. Defend against email threats. Deploy an email security service, with multiple safeguards including anti-spam, anti-malware and content filtering capabilities. Secure email traffic content. Block or flag all executable files and all suspicious orunusual file attachments, such as .cpl, .chm and .lnk files. Create alternative methods for file sharing. Ensure email security service can handle blended threats that combine spam with links to malicious websites. Educate users, from the bottom ranks all the way up to the C-suite, on the nature of today’s email attacks and conduct mock phishing exercises. Consider upgrading your IT email defences with Blockmail. 1. 2. 3. 4. 5.
  • 42. Unit 1, Block C, The Exchange Calmount Park, Ballymount, Dublin 12, Ireland Telephone: +353 (0)1 466 0686 Fax: + 353 (0)1 466 0687 Topsec Technology UK Castle Hill House 12 Castle Hill, Windsor, SL4 1PD, United Kingdom Telephone: + 44 (1784)725903 Topsec Technology Canada Suite 830, 5991 Spring Garden Road Halifax, B3H 1Y6, Nova Scotia Telephone: + 1 902 430 9340 Email: For sales enquiries: sales@topsectechnology.com For support enquiries: support@topsectechnology.com For DNS enquiries: dns@topsectechnology.com DISCOVER MORE ABOUT HOW TO COMBAT MALWARE AND SPAM WITH OUR FREE EBOOK DOWNLOAD. START YOUR FREE TRIAL TODAY produced by DOWNLOAD HERE