SBN

Part 2 – Effective strategies against inbound malicious email: using your own data

Having looked at best practices for utilizing blocklists in the first part of this series, let’s explore the value of maximizing your own data to protect your network from malicious inbound emails. After all, your email infrastructure contains data that may only occur on your specific network.

*** This is a Security Bloggers Network syndicated blog from The Spamhaus Project authored by The Spamhaus Team. Read the original post at: https://www.spamhaus.org/resource-hub/email-security/part-2-effective-strategies-against-inbound-malicious-email-using-your-own-data