Email Security

Phishing attacks & How to be safe from them.


The history of phishing reveals that the first phishing email originated sometime around the year 1995. Though, then the attacks were not so exceptional but still did the trick. Phishing attacks are often initiated through email communication. The phishing mail includes generic greetings as well as target’s name, phone number and other details to make …

Phishing attacks & How to be safe from them. Read More »

Mail ResQ -The Email Consultant

Mail ResQ is a brand started Operations in 2014 and providing Messaging, Security and Collaboration services –The Email Consultancy. Mail ResQ is a Messaging consultant for Corporate E-Mail Solutions, E-Mail Security and E-Mail Archiving requirements. We associate with various Email Service Providers like Microsoft Office 365, G-Suite, Zimbra, Rediff, IceWarp, IBM Verge, Mdaemon, netCORE, Postmaster & Mithi Skyconnect to create and deliver cost effective Corporate Mailing Messaging Solutions. …

Mail ResQ -The Email Consultant Read More »

Why use Email Archiving services?

  For many organizations, email’s role is business- or mission-critical, but spiraling costs caused by email requirements are leading these organizations to re-evaluate their architectures. A variety of external business and technical pressures are triggering a ripple effect in the costs associated with email backup, archiving, eDiscovery, security, high availability, and disaster recovery (DR) capabilities. …

Why use Email Archiving services? Read More »

GSuite -New Features in 2017

Google plans to add an array of new features to its G Suite of cloud-based work applications in 2017. At the Google Cloud Next event in London this week, the firm revealed the biggest changes in the pipeline and when they’ll arrive. Improvements are planned across G Suite—including Gmail, Docs, Drive, Sheets and more—and range …

GSuite -New Features in 2017 Read More »

Email Phishing Overshadows Risk Of Mobile Malware

Mobile Devices Demand Executive Diligence Mobile devices demand diligence at the CISO level. In fact, like the mobile device’s counterpart, workstations and laptops, many loaded malware campaigns begin with phishing attempts. One of the understated risks is that the mobile breach could allow for expansive lateral movement. Cyber Security Hub developed a market report to …

Email Phishing Overshadows Risk Of Mobile Malware Read More »