Best Practices for Protecting Your Small or Medium Size Business from Best Practices for Protecting Your Small or Medium | Page 9
A holistic approach to
phishing mitigation
Your approach to phishing protection should be a holistic one. It should accommodate on-premise
as well as hosted email systems. It should provide protection for all devices, offer settings you
control and have a simple user interface where administrators can see and control the entire
situation from a single pane of glass. And it should also include a layered approach to security.
A layered approach
A layered approach to anti-phishing protection provides a series of safeguards. Like a succession
of hurdles in a row. With each additional hurdle making it less and less likely that a malicious email
gets through.
Even with a hosted email solution, it’s wise to augment it with a cloud-based service provider as it
provides an additional layer of defense. And cloud-based service providers can be more effective at
protecting against zero-day exploits because they continually feed the data they uncover back to the
list and data providers in real time. This positive feedback loop makes cloud service providers quicker
at detecting new threats and outbreaks.
Protection for all devices
Handheld and mobile devices are a way of life in business today. Your phishing protection solution
should account for that. But you shouldn’t have to install a new plug in or configure software every
time an employee changes machines or brings in a new device.
The simplest way to become device independent and alleviate the need for custom software
configuration is to protect the device before the email gets to the device. Email security solutions
that are outside your corporate network give you the flexibility to provide protection for all your
devices without having to accommodate for changing devices.
Best Practices for Protecting Your Small or Medium
Size Business from Phishing
9