Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revisionLast revisionBoth sides next revision | ||
public:emai:malware [2023-03-09 12:11] – vesely | public:emai:malware [2023-03-09 12:12] – vesely | ||
---|---|---|---|
Line 12: | Line 12: | ||
**The generously opened and heterogeneous nature of the academic and research institution is extremely vulnerable to such kind of threat.** Regular enterprises and other profit-making businesses are usually much more homogenous with much simpler rules and measures against the third parties (no IMAP, no access to emails from non-business devices, strict mobile device management, blocked or limited traffic etc.). | **The generously opened and heterogeneous nature of the academic and research institution is extremely vulnerable to such kind of threat.** Regular enterprises and other profit-making businesses are usually much more homogenous with much simpler rules and measures against the third parties (no IMAP, no access to emails from non-business devices, strict mobile device management, blocked or limited traffic etc.). | ||
- | <font inherit/ | + | |
+ | Both areas of malicious or potentially problematic emails and regular emails are overlapping; | ||
+ | |||
+ | <font inherit/ | ||
< | < | ||
< | < | ||
+ | |||
**The most dangerous threats are usually those of the "zero day attack" | **The most dangerous threats are usually those of the "zero day attack" |