Outlook tip: Avoid email sending mistakes by rules and categories

It is a common mistake is to send an email to someone without intention. For example, by quickly replying to an internal email without realizing that there were external recipients included in the distribution list.

This blog is about avoiding sending emails to external email addresses by a mistake.

In the Microsoft Outlook, there are some client side settings which might help to prevent those mistakes: rules for incoming and outgoing emails, and email categories to visualize external emails to the user.

The figure below shows an example:

  • ellipse 1: incoming email list shows External category for all received emails which come from external or has external recipients. This is done by 2 rules: “Email from External” and “Email with External recipients

Outlook-external-rules

  • ellipse 2: Category External is visible in the reading pane as well.
  • ellipse 3: Emails send with External recipients will stay in the Outbox for 5 minutes. This is done by rule “Email send to External“. The 5 min delay can be avoided if the user specifically assign category “Send Now” for the email.

Categories External and “Send Now”

outlook-rules-categories

Rule: Email from External

outlook-rules-emailfromexternal

Rule: Email with External recipients

outlook-rules-emailwithexternalrecipients

 

Rule: Email send to External

This rule will delay the email sending for 5 minutes. During that time the email is kept in the Outbox. Therefore it is practical to include also the Outbox in the Favorites to make it visible to the user.

outlook-rules-emailsendtoexternal

More Information

These rules are using the fact, that in the Microsoft Outlook, internal email addresses do not contain “@” character. Naturally there are many other adaptations possible in the rules.

Note, custom actions like preventing the sending of the email in certain conditions requires some 3pp tool or programming.

Posted in Security Training, Awareness and Reports, Tips | Comments Off on Outlook tip: Avoid email sending mistakes by rules and categories

Digital Attack Map, by Google and Arbor Networks

There is an interesting new site Digital Attack Map related to DDoS attacks. Worth to have a look!

From About:

Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks.

The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day.

The figure below shows the current status visible at their main page (Nov 13, 2013).

DigitalAttackMap2013-11-13

One can easily see the situation from any other day, for example see figure below.

DigitalAttackMap2013-10-28

More about DDoS

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

Links

Posted in Security Incidents and Cases, Security News, Security Threats, Security Training, Awareness and Reports | Comments Off on Digital Attack Map, by Google and Arbor Networks

Microsoft Security Intelligence Report

Security Intelligence Reports are available at Microsoft site.

What it is?

Microsoft Security Intelligence Report provides in-depth perspectives on software vulnerabilities in Microsoft and third-party software, exploits, malicious code threats, and potentially unwanted software.

The SIR website also includes deep analysis of trends found in more than 100 countries/regions around the world and offers suggestions to help manage risks to your organization, software, and people.

The figure below is taken from Key Findings, and is showing malware encounter rates.

Microsoft-SIR-encounterrate2013

SIR v15 Deliverables

Posted in Security Incidents and Cases, Security Management, Security Threats, Security Training, Awareness and Reports | Comments Off on Microsoft Security Intelligence Report

Electronic Communication Annual Incident Reports, by ENISA

ENISA publishes annual reports about significant incidents in the electronic communications sector.

ENISA is receiving these reports from National Authorities (see figure below).

ENISA2012-incidentreports1

The latest report from 2012 incidents is now available. In total 18 countries reported 79 significant incidents, 9 countries reported no significant incidents.

There are several interesting statistics in the report. For example, the figure below shows causes of incidents.

ENISA2012-incidentreports2

Links

Posted in ENISA, ICT Leadership and Management, Security Incidents and Cases, Security Training, Awareness and Reports | Comments Off on Electronic Communication Annual Incident Reports, by ENISA

2013 TMT Global Security Study, by Deloitte

Deloitte is producing interesting material.

For example the 2013 TMT Global Security Study and related infographic

deloitte-TMT-security-2013

The updates for 2014 might come in the beginning of the year?

Links

Posted in ICT Leadership and Management, Security Management, Security News, Security Threats, Security Training, Awareness and Reports | Comments Off on 2013 TMT Global Security Study, by Deloitte

IT Law wiki, ICT related encyclopedia

In addition to wikipedia, IT Law wiki is a good complementary information site. And the content at IT law wiki is more specific to ICT.

IT-LAW

Comparison “IT Law wiki” <-> Wikipedia

IT Law wiki

Wikipedia

Cybercrime Cybercrime
Surveillance Surveillance
Policy Policy
Malware Malware
Spyware Spyware
Policy Policy
Rootkit Rootkit
Posted in Definitions, ICT Leadership and Management, ICT Terminology, Security Management, Security Terminology, Security Training, Awareness and Reports | Comments Off on IT Law wiki, ICT related encyclopedia

Application Security Weaknesses, OWASP Top 10

OWASP (Open Web Application Security Project) is maintaining top 10 list of most common application vulnerabilities/weaknesses.

  • Injection
  • Broken Authentication and Session Management
  • Cross-Site Scripting (XSS)
  • Insecure Direct Object References
  • Security Misconfiguration
  • Sensitive Data Exposure
  • Missing Function Level Access Control
  • Cross-Site Request Forgery (CSRF)
  • Using Components with Known Vulnerabilities
  • Unvalidated Redirects and Forwards

OWASP-top-ten

 

Links

Other links

    Posted in Security Management, Security Standardization and Practises, Security Threats, Security Training, Awareness and Reports | Comments Off on Application Security Weaknesses, OWASP Top 10