Best Practices for Protecting Your Small or Medium Size Business from Best Practices for Protecting Your Small or Medium | страница 2
Table of Contents
A problem that can’t be solved (completely).............................................................................. 3
It’s about mitigation...................................................................................................................................3
Training alone won’t do it.......................................................................................................... 4
Training is essential but…..........................................................................................................................4
Stop threats before they reach your inbox............................................................................................5
Phishing is a two way problem.................................................................................................. 5
Protecting your users and your reputation...........................................................................................5
Domain name spoofing protection.........................................................................................................6
More than just checking the email............................................................................................ 6
Checking the email is just the starting point........................................................................................6
Real time website scanning.....................................................................................................................7
If it isn’t real time don’t bother.................................................................................................. 7
Continuous link checking..........................................................................................................................8
Notifications should also be in real time...............................................................................................8
A holistic approach to phishing mitigation................................................................................ 9
A layered approach.....................................................................................................................................9
Protection for all devices..........................................................................................................................9
Protection with settings you control................................................................................................... 10
Simple dashboard control...................................................................................................................... 10
Price and convenience matter too........................................................................................... 10
Email protection doesn’t have to be expensive or difficult............................................................. 10
Summary of best practices..................................................................................................... 11
Conclusion............................................................................................................................. 13
Best Practices for Protecting Your Small or Medium
Size Business from Phishing
2