142 KB | 3 files | DOC, ODF
Internet e-mail can be a burden in both lost productivity and spam hammering your already overtasked servers. These guidelines wil help you reign in this problem on your Exchange messaging system
E-mail can take up a lot of employees' time during the work day, particularly personal e-mail. In addition, spam e-mail can add just as much frustration for employees trying to focus on their jobs. The attached document provides a guide to restricting Internet e-mail.
The attached Zip file includes:
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities. ... More >>
In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise. ... More >>
Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics. ... More >>