{"id":7253,"date":"2017-04-06T06:33:15","date_gmt":"2017-04-06T14:33:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/06\/news-1044\/"},"modified":"2017-04-06T06:33:15","modified_gmt":"2017-04-06T14:33:15","slug":"news-1044","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/04\/06\/news-1044\/","title":{"rendered":"Top 5 email security best practices to prevent malware distribution"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt4.staticworld.net\/images\/article\/2017\/03\/email-encryption-100712692-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Ryan Francis| Date: Thu, 06 Apr 2017 06:29:00 -0700<\/strong><\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3187756\/security\/top-5-email-security-best-practices-to-prevent-malware-distribution.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Ryan Francis| Date: Thu, 06 Apr 2017 06:29:00 -0700<\/strong><\/p>\n<article class=\"slideshow\">\n<figure class=\"slide\"><figcaption>A trusted channel<\/figcaption><img decoding=\"async\" data-imageid=\"100712692\" src=\"http:\/\/images.techhive.com\/images\/article\/2017\/03\/email-encryption-100712692-orig.jpg\" data-thumb-src=\"http:\/\/images.techhive.com\/images\/article\/2017\/03\/email-encryption-100712692-orig.jpg\" alt=\"email encryption\" data-license=\"Getty Images\"\/><\/p>\n<p class=\"slideCredit\">Image by <span class=\"slideCreditText\">Thinkstock<\/span><\/p>\n<div class=\"slideBody\">\n<p>Email is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. That said, organizations often don\u2019t understand that the file types used every day to share important information \u2013 standard files like Word docs, Excel spreadsheets and PDFs \u2013 are also the most common attack vectors widely used for the distribution of malware. For cybercriminals, it\u2019s often too easy to target a user with a spoofed email or phishing attack, and trick them into opening an infected attachment that appears to be legitimate.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3187756\/security\/top-5-email-security-best-practices-to-prevent-malware-distribution.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11379,714],"class_list":["post-7253","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-application-security","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7253"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7253\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7253"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}