<img height="1" width="1" src="https://www.facebook.com/tr?id=1529264867168163&amp;ev=PageView &amp;noscript=1">
blog_listing_hero_img.jpg

ENow Software blog

30
Jun

Securing Exchange Servers

Securing Exchange Servers Securing Exchange servers is hard. I mean it can be a giant pain sometimes. There are what, hundreds of millions or maybe billions of lines of code...
Read More
24
Jun

Thanks for all the Phish...

Thanks for all the phish.. There’s a running joke in the industry at the moment that the COVID-19 pandemic has done more to drive digital transformation in organizations than any...
Read More
05
Jun

Deploying Outlook mobile securely in the enterprise (Part 2)

Have you rad part 1 yet? This is a hefty topic, thus we had to break it up to two blogs. In part 1, Dominik Hoeffling goes over Outlook Mobile security basics, securing access to...
Read More
16
May

Email Security | How to Protect Against CFO Fraud (Part 2)

In Part 1, I discussed the implication of CFO fraud and how it can affect your company. It can cost a lost of money when transferred to the wrong accounts, CEOs and CFOs get fired...
Read More
18
Apr

LDAP Policies & Exchange Deployment

The Exchange Team provides you the Exchange Role Requirements Calculator now for a long time. This tool is still maintained and the preferred one for correct sizing. You can find...
Read More
10
Apr

Email Security - How to Protect Against CFO Fraud

Everybody receives spam and phishing email. Most of the time they are easy to recognize and just annoying, but sometimes there’s phishing email that’s harder to detect by eye....
Read More

Subscribe

to blog Updates

Subscribe to Email Updates

Posts by topic

Posts by Topic

see all

Enjoying the blog? Subscribe!

Subscribe to Email Updates