In this insight, we look at what email trackers are, how they work, what the main concerns about them are, plus how you can protect yourself from email trackers. What Is An Email Tracker? An email tracker is a tool or technology used to monitor and track the...
If you’d like a way to share experiences, celebrate milestones, conduct a poll, propose ideas, and discuss your interests with people across your organisation directly from Microsoft Outlook, try Storyline Posts. Here’s how: – In Outlook, go to the...
In this insight, we look at the popular email authentication protocols SPF, DKIM, and DMARC, how they work, why they’re important, and what happens if they’re not set up properly. What Is SPF? SPF, or Sender Policy Framework, is an email authentication protocol used...
If you regularly use Gmail, switching-on ‘Smart Compose’ in your Gmail settings can enable time-saving predictive writing suggestions to appear as you compose an email. Here’s how to switch it on: – In Gmail, top right, click on the cog icon – Settings...
In this insight, we look at what BEC campaigns are, their characteristics, together with what businesses can do to protect themselves from the threat of BEC campaigns. What Is A BEC Campaign? A business email compromise (BEC) campaign is a kind of text-based,...
In this insight, we take a look at some of the many options available for sharing files that self-destruct. Why? Many business IT users have occasions where they need to send sensitive information, e.g. passwords and other private work data and files but would feel...