142 KB | 3 files | DOC, ODF
Internet e-mail can be a burden in both lost productivity and spam hammering your already overtasked servers. These guidelines wil help you reign in this problem on your Exchange messaging system
E-mail can take up a lot of employees' time during the work day, particularly personal e-mail. In addition, spam e-mail can add just as much frustration for employees trying to focus on their jobs. The attached document provides a guide to restricting Internet e-mail.
The attached Zip file includes:
The Framework enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophistication – to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. ... More >>
This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating a variety of attributes. ... More >>
This excerpt from chapter 7 provides an overview of cellular networks, LANs, PANs, WLAN security, and best practices for mobile device security. ... More >>