Email Security: More Crucial Than Ever
John Iacono • May 1, 2017

May 1, 2017

In today’s hyper-connected world, email-based communications are not just commonplace – they are a fundamental cornerstone for effectively conducting business.  Icon, Letters, Post, Email, Symbols

Emails offer hackers a vehicle to exploit a variety of vulnerabilities in an organization and we want to make sure you’re protected. 

Most email threats fall into one of these seven categories:

  1. Malware
  2. Ransomware
  3. Phishing
  4. Spear Phising/ Whaling
  5. Business EMail Compromise
  6. Spam
  7. Outbound Email Hijacking

One of our partners, Sonicwall , put together a great brief that details:

  • The 7 types of email threats mentioned above
  • What your email security solution should include

To effectively combat today’s emerging threats, organizations are well-advised to implement a next generation email security management solution that provides fundamental email protection.

Given today’s complex, mature threats, it’s tantamount that organizations deploy a multi-layered security solution that includes dedicated, leading-edge email protection.  One possible solution is  Sonicwall’s new email security tool. 

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is an attack via e-mail that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

 

How can mobile device security affect your business?

 

Accessing work via smartphones:  When your employees access work email or documents over their smartphone, you are at risk for malware, ransomware, phishing and other cyberattacks. This risk is especially increased when employees are connected to risky, unprotected networks.

Existing apps on employee’s smartphones: Your employees may be currently using risky apps that have extensive insight on users. This can lead to the app developer being able to see work related activities that your employee is doing while using their smartphone.

 

By John Iacono August 1, 2025
For growing businesses, IT challenges can be unpredictable. One moment everything is humming along; the next, there’s a server failure, a phishing attack or a sudden compliance audit on your doorstep. If you have internal IT staff, you may assume you’re fully prepared, but the reality is that internal IT teams often get stretched thin,... The post How an Outsourced MSP Can be the Missing Piece for Your Tech Needs appeared first on Fairdinkum.
By John Iacono July 23, 2025
Not to play on stereotypes, but Geoff Corbett, professional services manager, says he fits the “nerdy IT person” label. For the past 18 years – and really throughout his life – Geoff has propelled his love of gaming and technology into a career. And we’re grateful to have him at Fairdinkum! His wide knowledge of... The post Geoff Corbett: Professional Services Manager appeared first on Fairdinkum.
By John Iacono July 21, 2025
As more businesses shift toward cloud-first operations, moving your company’s file systems from on-premise servers to a cloud platform like Microsoft SharePoint might seem like an obvious next step. But this type of migration is not a simple “drag and drop.” It requires strategic planning, technical alignment and user preparation to ensure the transition improves... The post Strategic Steps for a Seamless Cloud File System Migration appeared first on Fairdinkum.
Show More →