Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:emai:malware [2023-03-09 09:42] – vesely | public:emai:malware [2023-03-09 12:11] – vesely | ||
---|---|---|---|
Line 12: | Line 12: | ||
**The generously opened and heterogeneous nature of the academic and research institution is extremely vulnerable to such kind of threat.** Regular enterprises and other profit-making businesses are usually much more homogenous with much simpler rules and measures against the third parties (no IMAP, no access to emails from non-business devices, strict mobile device management, blocked or limited traffic etc.). | **The generously opened and heterogeneous nature of the academic and research institution is extremely vulnerable to such kind of threat.** Regular enterprises and other profit-making businesses are usually much more homogenous with much simpler rules and measures against the third parties (no IMAP, no access to emails from non-business devices, strict mobile device management, blocked or limited traffic etc.). | ||
- | + | < | |
- | Both areas of malicious or potentially problematic emails and regular emails are overlapping; | + | < |
+ | < | ||
**The most dangerous threats are usually those of the "zero day attack" | **The most dangerous threats are usually those of the "zero day attack" | ||
Line 43: | Line 44: | ||
* [[: | * [[: | ||
< | < | ||
- | * [[: | + | * [[: |
< | < | ||
* [[: | * [[: |