The articles to follow deal with one of the most discussed topics around the world, e-mail security. GFI.COM was kind enough to allow Firewall.cx visitors to gain access to their excellent White Page database covering hot e-mail security topics.
Articles Tagged ‘email’
One of the most important features in any network security monitoring and patch management application such as GFI’s LanGuard is the ability to automate tasks e.g automatic network scanning, email alerts etc. This allows IT Administrators, Network Engineers, IT Managers and other IT Department members, continue working on other important matters while they have their peace of mind that the security application is keeping things under control and will alert them instantly upon any changes detected within the network or even vulnerability status of the hosts monitored.
GFI LanGuard’s email alerting feature can be easily accessed either from the main Dashboard where usually the Alerting Options notification warning appears at the bottom of the screen:
Figure 1. GFI LanGuard email alerting Option Notification
Or alternatively, by selecting Configuration from the main menu and then Alerting Options from the left side area below:
Companies and users around the world are struggling to keep their network environments safe from malicious attacks and hijacking attempts by leveraging services provided by high-end firewalls, Intrusion Detection Systems (IDS), antivirus software and other means. While these appliances can mitigate attacks and hacking attempts, we often see the whole security infrastructure failing because of attacks initiated from the inside, effectively by-passing all protection offered by these systems.
I’m sure most readers will agree when I say that end-users are usually responsible for attacks that originate from the internal network infrastructure. A frequent example is when users find a link while browsing the Internet they tend to click on it to see where it goes even if the context suggests that the link may be malicious. Users are unaware of the hidden dangers and the potential damage that can be caused by clicking on such links.
The implications of following links with malicious content can vary for each company, however, we outline a few common cases often seen or read about:
- Hijacking of the company’s VoIP system, generating huge bills from calls made to overseas destination numbers (toll fraud)
- The company’s servers are overloaded by thousands of requests made from the infected workstation(s)
- Sensitive information is pulled from the workstations and sent to the hackers
- Company Email servers are used to generate and send millions of spam emails, eventually placing them on a blacklist and causing massive communication disruptions
- Remote control software is installed on the workstations, allowing hackers to see everything the user is doing on their desktop
- Torrents are downloaded and seeded directly from the company’s Internet lines, causing major WAN disruptions and delays
As you can see there are countless examples we can analyze to help us understand how serious the problem can become.
Download this whitepaper if you are interested to:
- Learn which are the Top 10 Dangerous sites users visit
- Learn the Pros and Cons of each website category
- Understand why web content filtering is important
- Learn how to effectively block sites from compromising your network
- Learn how to limit the amount of the time users can access websites
- Effectively protect your network from end-user ‘mistakes’
- Ensure user web-browsing does not abuse your Internet line or Email servers
We apologise however the whitepaper is no longer available by the vendor. Head to our homepage to read up on new network and security related articles.