Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| public:emai:malware [2023-03-09 12:12] – old revision restored (2023-03-09 09:45) vesely | public:emai:malware [2026-04-19 21:40] (current) – vesely | ||
|---|---|---|---|
| Line 12: | Line 12: | ||
| **The generously opened and heterogeneous nature of the academic and research institution is extremely vulnerable to such kind of threat.** Regular enterprises and other profit-making businesses are usually much more homogenous with much simpler rules and measures against the third parties (no IMAP, no access to emails from non-business devices, strict mobile device management, blocked or limited traffic etc.). | **The generously opened and heterogeneous nature of the academic and research institution is extremely vulnerable to such kind of threat.** Regular enterprises and other profit-making businesses are usually much more homogenous with much simpler rules and measures against the third parties (no IMAP, no access to emails from non-business devices, strict mobile device management, blocked or limited traffic etc.). | ||
| - | + | < | |
| - | Both areas of malicious or potentially problematic emails and regular emails are overlapping; | + | < |
| + | < | ||
| + | < | ||
| **The most dangerous threats are usually those of the "zero day attack" | **The most dangerous threats are usually those of the "zero day attack" | ||