Quality Plus Consulting - Breakfast Bytes
Technology
NDAA 2021 legislation is forcing a gaps closure in SPF, DKIM, and DMARC.
This stuff is really complicated. Get some seriously competent help. I don't think most ITSPs (IT service providers) have enough experience in managing this especially in light of the inclusions of marketing automation platforms on root domains.
You cannot be driving a hole with a 20 lb sledgehammer through your email ingress filtration policies in order to accommodate for incompetently configured sender framework on behalf of your senders.
It's time to push back on their incompetence. Get your VISO involved and get policies in place such as ones that IT will not be requested to put holes in security in order to accommodate senders with bad email systems. Instead, letters will go to bad senders to tell them to get their house in order.
You need to get your own house in order in order to make sure that your emails are deliverable. Cybersecurity insurance providers are assessing this information as part of your risk profile.
Salesforce Email Service Used for Phishing Campaign | eSecurityPlanet
For more information on this topic: Email Deliverability- The Titanic Problem Headed Your Way
K12 Technology and Cybersecurity Challenges and Solutions
Practical example of how operational maturity improves productivity while reducing risk
Unlocking Strategic IT Investments and Information Security
Domain/DNS hosting, account ownership, security issues and TCO
Cyber Insurance versus Cyber Warranty
Demystifying IT Services and the Shared Responsibility Paradigm
How establishing requirements properly results in best outcomes
Operational Maturity is required to have Information Security Risk Management
Managing the impact of changing IT service providers
CMMC and latest DoD memo implications and far reaching effects related to FedRAMP
Why the ship has sailed on BYOD
Threats to mobile devices and how to manage them, part 2
Physical threats to mobile phones, SIM hijacking, out of band SMS, and Yubikeys
How to analyze workloads and decide how they should be hosted
How a lack of understanding of business processes relates to adverse financial impact
Email security management and monitoring is critical
CISO, CTO, CIO, what’s the difference?
Zero trust fundamentals
FTC SafeguardsRule, IRS requirements, and tax preparers
Methods to prevent business email compromise
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
A Prairie Home Companion: News from Lake Wobegon