Best Practices for Protecting Your Small or Medium Size Business from PhishProtection_Best_Practices_For_Protecting_Your | Page 2

Table of Contents A problem that can’t be solved (completely).............................................................................. 3 It’s about mitigation...................................................................................................................................3 Training alone won’t do it.......................................................................................................... 4 Training is essential but…..........................................................................................................................4 Stop threats before they reach your inbox............................................................................................5 Phishing is a two way problem.................................................................................................. 5 Protecting your users and your reputation...........................................................................................5 Domain name spoofing protection.........................................................................................................6 More than just checking the email............................................................................................ 6 Checking the email is just the starting point........................................................................................6 Real time website scanning.....................................................................................................................7 If it isn’t real time don’t bother.................................................................................................. 7 Continuous link checking..........................................................................................................................8 Notifications should also be in real time...............................................................................................8 A holistic approach to phishing mitigation................................................................................ 9 A layered approach.....................................................................................................................................9 Protection for all devices..........................................................................................................................9 Protection with settings you control................................................................................................... 10 Simple dashboard control...................................................................................................................... 10 Price and convenience matter too........................................................................................... 10 Email protection doesn’t have to be expensive or difficult............................................................. 10 Summary of best practices..................................................................................................... 11 Conclusion............................................................................................................................. 13 Best Practices for Protecting Your Small or Medium Size Business from Phishing 2