Netmail Blog

Judi Kohn

Find me on:

Recent Posts

A Paradigm Shift - Is Security Software (as we currently know it) Becoming Extinct?

Posted by Judi Kohn

Jun 3, 2014 10:27:00 AM

After marketing commercial antivirus software for over 25 years, Symantec Corp. recently announced that traditional antivirus software is dead and traditional antivirus tactics are doomed to failure. They stated that part of the problem is that an increasing number of exploits use novel rather than known malicious code, so signature-based defenses plus the use of heuristics to identify Zero-Day vulnerabilities is no longer enough. 

Read More

Topics: Email Security, Email Management, data breach, anti-virus, cyber threats, security

Microsoft Exchange Architectural Evolution – Cloud Messaging Services and the Evolution of Choice

Posted by Judi Kohn

Jun 2, 2014 9:31:00 AM

Technology. Most of us would agree that it is a key part of the world around us. In the field of technology, the first sixty plus years have seen spectacular progress in all aspects of the domain. Ever shrinking transistors have enabled the production of increasingly complex and cost-effective microchips, a scenario that has driven the surge in technological design. This fits with Moore’s Law, the observation (not a physical law) that the number of transistors on integrated circuits doubles approximately every two years. 

Read More

Topics: Email storage, Email Management, Office 365, Netmail Archive, Microsoft Exchange 2013, Cloud

Microsoft and Novell Technology Roadmap Considerations - Update any End-of-Life Products

Posted by Judi Kohn

May 1, 2014 5:37:00 PM

All good things come to an end eventually...  With spring finally around the corner, spring cleaning is in order, and this includes updating or at least planning to update any end-of-life Microsoft or Novell Enterprise software that is still deployed in your organization.

On the Microsoft side, this includes the Windows XP operating system, Exchange 2003, Outlook 2003, and Windows Server 2003. On the Novell side, this includes GroupWise 7 and 8.
Read More

Secure Passwords with a Roll of the Dice

Posted by Judi Kohn

Apr 24, 2014 10:02:08 AM

Before the severity of the Heartbleed exploit was revealed, weak passwords and passphrases were (and still are) one of the most common computer security flaws. A question that you may wish to ask yourself is whether your organization has a policy to help users generate secure, easy-to-remember passwords or passphrases. This, of course, leads to another question:  what is the most effective way to manage passwords in an increasingly complex online world? 

Read More

Topics: passphrase, security, password

How did that @#*&! Ex-Employee Access the Mail System and Send those @#$%&! Messages??

Posted by Judi Kohn

Mar 24, 2014 11:06:00 AM

While deciding what to blog about next, I read this article that likely applies to anyone administering Microsoft Exchange since it highlights a security issue that can arise in any organization:

Unauthorized remote access to mail resources by recently-terminated employees.

The key points from the linked article are discussed below. The main thing to note is that in Exchange environments, no hacks are needed for an employee to retain access to mail resources in the immediate hours following termination of employment. Fortunately, there are measures you can implement to prevent this from happening...

Read More

Topics: Email Security, Microsoft Exchange, OWA

Is the Recent NTP Server Exploit a Sign of the Times?

Posted by Judi Kohn

Mar 3, 2014 9:25:00 AM

Recently, hackers exploited key vulnerabilities in the Network Time Protocol (NTP) to attack servers based in Europe. NTP, used to synchronize computer clocks, is one of several protocols used within the infrastructure of the internet to keep things running smoothly. First implemented in 1985, NTP is one of the oldest IP protocols still in use both in Unix/Linux and Windows environments. In Unix/linux environments, it runs as the ntpd daemon and under Windows, it runs as a service that is able to synchronise a computer’s clock to the NTP server (Windows Time service/W32Time).

The massive NTP server attack was described by online security specialists Cloudflare as the biggest attack of its kind. Measured at around 400 gigabits per second , the exploit flooded target servers with huge amounts of data through a Distributed Denial of Service (DoS) attack. In a DoS attack, massive amounts of data are directed at a target which is overwhelmed and forced offline, preventing it from carrying out its intended function.

Read More

Topics: Email Security, cyber threats, DoS attacks

Subscribe to Email Updates

Most Popular

Follow Me