All Admins are not Alike: Granular Administration of Rights for Email Security

When it comes to granting rights, managers responsible for enterprise IT would always like to define access to important systems as precisely as possible. It is only in the rarest cases that one uniform administrator profile is sufficient for the entire IT support: Especially with regard to email security, it often occurs in practice that support employees are only supposed to monitor the flow of messages for one specific department or site.

Read more

Tags: // //

How to protect yourself from blackmail trojan Locky

Since last week the aggressive blackmail Trojan Locky has been causing mischief on computers around the globe. Retarus expands existing spam and virus protection functions and switch all customers over to fourfold virus scanning for the duration of the current, acute threat. To protect yourself as well as possible from attacks by Locky and similar ransomware, users should additionally be vigilant when running macros.

Read more

Tags: // // // //

Retarus Attachment Blocker: Filter emails containing untrustworthy attachments

Retarus E-Mail Security does not only safeguard you from virus and spam. Also other types of unwanted messages can be easily filtered out: The Retarus Attachment Blocker prevents therefore the receipt of all file attachments which the administrator has classified untrustworthy or which should be precluded from gaining entry to the company infrastructure for other reasons – regardless of their file format.

Read more

Tags: // //