<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

VIDEO: Remote Workforce Roundtable Interview with Randy Scadden

The full interview with Randy Scadden, Senior Global Sales Engineer at Proofpoint an enterprise email security focused cybersecurity solutions provider. The interview is around the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

What is Email Encryption?

Encryption is a method to cypher data that a user sends and receives, as well as data that resides on endpoints and servers.

VIDEO: Remote Workforce Roundtable Interview with Paul Jakobsen of Proofpoint

The full interview with Paul Jakobsen, North American Channel Manager at Proofpoint an enterprise email security focused cybersecurity solutions provider. The interview is around the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

How Proofpoint Enables Business Continuity

Email is the lifeline that connects remote workers to their organizations, especially a growing number of teams work from home or collaborate across the globe. But increasing an organization’s digital presence brings with it a growing number of digital threats. Crashes in cloud-based email platforms can slash productivity and create complications. Meanwhile, sophisticated cyber-attacks can compromise not just the security of employees, but also their data and the applications they use to do their jobs.

How a SOC Handles Credential Harvesting

By Nick Sandin, Security Analyst and contributing author Brandon Doty, SOC Manager Dealing with credential harvesters has its perks. Day in and day out I get to personally observe how sophisticated a phishing website can be. Some websites are so elaborate that only a trained analyst can identify them, while others are so obvious no one in their right mind would fall for it. Either way, if it looks suspicious just follow the “POST”.

What is Proofpoint and How Does it Work?

Proofpoint is a cybersecurity platform aimed to protect workers and data from advanced cybersecurity criminals that target email, social media and mobile devices.

Why Phishing is Still a Problem

Is Phishing Still a Problem?

How Does Mimecast Work?

Mimecast is a cloud-based, anti-spam, and archive filtering service for securing email accounts and communications for businesses.

Successful Password Policies for Organizations

Learn some of the basic considerations when establishing a strong password policy for your organization. Find out some of the best practices and industry standards when it comes to user access and a password policy framework. Most places of business require that their employees access their facilities by using a key or key card. In many ways, passwords are the keys by which employees access their workplace network. With physical office keys or card readers, proper policies and procedures must be implemented to ensure that unauthorized access does not occur. The same holds true with successful password policies for organizations.

    Related Posts

    Lumifi Cyber Acquires Datashield to Deliver Next-Generation Managed Detection and Response

    Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    The Difference Between Cybersecurity & Network Security

    The Difference Between Cybersecurity & Network Security